ParkerVision D2D00003 2.4 GHz WIRELESS LAN ROUTER User Manual d2d access point manual rev 030104a indd

ParkerVision Inc 2.4 GHz WIRELESS LAN ROUTER d2d access point manual rev 030104a indd

Contents

USERS MANUAL 1

Horizons Model 1500WR
Wireless 4-Port Router
User’s Guide
www.direct2data.com
REVISION: 1
VERSION: 030104A
DATE: March 2004
PRELIMINARY
Horizons 1500WR Wireless 4-Port Router
2
ParkerVision
COPYRIGHT
©2003 ParkerVision Inc. All rights reserved. ParkerVision Horizons™ and D2D™ Technology are
registered trademarks of ParkerVision Inc. All specications are subject to change without notice.
May include one or more of the following patents: US6421534, US6049706, US6266518, US6061555,
US6061551,US6353735, US6091940, US6370371 Additional Patents Pending.
Designed and manufactured in the USA.
FCC INTERFERENCE STATEMENT
FCC ID: JFE-D2D00003
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause undesired
operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harm-
ful interference in a commercial environment. This equipment generates, uses, and can radiate radio
frequency energy, and if not used in accordance with the instructions, may cause harmful interference to
radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined
by turning the equipment off and on, the user is encouraged to try to correct the interference by one of
more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
INFORMATION TO USER: THE USER’S MANUAL OR INSTRUCTION MANUAL FOR AN INTENTION-
AL OR UNINTENTIONAL RADIATOR SHALL CAUTION THE USER THAT CHANGES OR MODIFICA-
TIONS NOT EXPRESSLY APPROVED BY THE PARTY RESPONSIBLE FOR COMPLIANCE COULD
VOID THE USER’S AUTHORITY TO OPERATE THE EQUIPMENT.
“FCC RF exposure requirements: When in operation, the device should be located such that it is more
than 20 cm. away from people and their person. This transmitter is restricted for use with the specic
antenna(s) tested in the application for Certication. The antenna(s) used for this transmitter must not
be co-located or operating in conjunction with any other antenna or transmitter.”
Horizons 1500WR Wireless 4-Port Router
3
ParkerVision
LIMITED WARRANTY
PLEASE READ THIS MANUFACTURER’S GUARANTEE CAREFULLY TO UNDERSTAND YOUR
RIGHTS AND OBLIGATIONS.
MANUFACTURER’S GUARANTEE AND LIMITATION OF LIABILITY
Note: The following guarantee is not restricted to any territory and does not affect any statutory rights that
you may have. The term “Hardware Device” means the enclosed Direct2Data™ Technologies Hardware
Device. This Manufacturer’s Guarantee does not cover your data, or any separate software, whether or
not packaged or included with the Hardware Device.
Direct2Data Technologies GUARANTEE. Direct2Data Technologies guarantees (this “Guarantee”) that
on the day you receive the Hardware Device and for the next (1) year thereafter (a) the Hardware Device
will be substantially free from defects in materials and workmanship, and (b) any support services provided
by Direct2Data Technologies will be substantially as described in applicable written materials provided to
you by Direct2Data Technologies, and Direct2Data Technologies support engineers will use reasonable
efforts, care and skill to solve any problem issues. In the event that the Hardware Device fails to comply
with this Guarantee, Direct2Data Technologies shall either, at Direct2Data Technologies’ option, (a) repair
or replace the Hardware Device or (b) return the price you paid for the Hardware Device (if any), provided
that you return the Hardware Device to Direct2Data Technologies with a copy of your receipt of purchase.
You may exercise this remedy without charge, except that you are responsible for any expenses you
may incur. This Guarantee is void if failure of the Hardware Device results from any accident, abuse or
misapplication. Any replacement Hardware Device shall be guaranteed for the remainder of the original
Guarantee period or thirty (30) days, whichever is longer. Direct2Data Technologies shall not be liable for
any loss or damage that you could have reasonably avoided, for example, by backing up your software
and les regularly,
In addition, you may receive a full refund of your purchase price within the rst 30 days following the
purchase of the Hardware Device for any reason provided that you return the Hardware Device to the
Manufacturer in its original condition, accompanied by the receipt of purchase.
EXCLUSION OF ALL OTHER TERMS. YOU AGREE THAT THIS GUARANTEE IS YOUR SOLE
GUARANTEE IN RELATION TO THE HARDWARE DEVICE AND ANY SUPPORT SERVICES.
DIRECT2DATA TECHNOLOGIES AND ITS SUPPLIERS MAKE NO OTHER GUARANTEES OR
WARRANTIES WITH RESPECT TO THE HARDWARE DEVICE, THE SUPPORT SERVICES AND ANY
PRODUCT MANUAL(S) OR OTHER WRITTEN MATERIALS THAT ACCOMPANY THE HARDWARE
DEVICE. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND SUBJECT TO THIS
GUARANTEE, DIRECT2DATA TECHNOLOGIES AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
CONDITIONS AND OTHER TERMS, EITHER EXPRESS OR IMPLIED (WHETHER BY STATUTE,
COMMON LAW, COLLATERALLY OR OTHERWISE), INCLUDING BUT NOT LIMITED TO ANY (IF
ANY) IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY
AND FITNESS FOR PARTICULAR PURPOSE, LACK OF VIRUSES, LACK OF NEGLIGENCE, LACK
OF WORKMANLIKE EFFORT, TITLE, AUTHORITY, OR NONINFRINGEMENT WITH RESPECT TO
THE HARDWARE DEVICE, THE SUPPORT SERVICES AND THE PRODUCT MANUAL(S) OR OTHER
WRITTEN MATERIALS THAT ACCOMPANY THE HARDWARE DEVICE.
Continued Next Page
Horizons 1500WR Wireless 4-Port Router
4
ParkerVision
ANY IMPLIED WARRANTIES THAT ARE NOT DEEMED EXCLUDED ARE LIMITED TO THE ORIGINAL GUARANTEE
PERIOD OR TO THE SHORTEST PERIOD PERMITTED BY APPLICABLE LAW, WHICHEVER IS GREATER. LIMITATION
OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND EXCEPT AS PROVIDED IN THIS
GUARANTEE, DIRECT2DATA TECHNOLOGIES AND ITS SUPPLIERS SHALL NOT BE LIABLE FOR ANY DAMAGES
WHATSOEVER (INCLUDING WITHOUT LIMITATION, SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES,
DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION OR
OTHER PECUNIARY LOSS, FOR PERSONAL INJURY OR FOR FAILURE TO MEET ANY DUTY INCLUDING GOOD FAITH
OR REASONABLE CARE, OR FOR NEGLIGENCE) ARISING OUT OF THE USE OR INABILITY TO USE THE HARDWARE
DEVICE, EVEN IF DIRECT2DATA TECHNOLOGIES HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN
ANY CASE DIRECT2DATA TECHNOLOGIES’S ENTIRE LIABILITY UNDER ANY PROVISION OF THIS AGREEMENT SHALL
BE LIMITED TO THE AMOUNT ACTUALLY PAID BY YOU FOR THE HARDWARE DEVICE. THESE LIMITATIONS DO NOT
APPLY TO ANY LIABILITIES THAT CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAWS. THE FOREGOING
LIMITATIONS, EXCLUSIONS AND DISCLAIMERS SHALL APPLY TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, EVEN IF ANY REMEDY FAILS ITS ESSENTIAL PURPOSE.
REGISTRATION. You need not return the registration card for this Guarantee to be effective.
BENEFICIARY. To the extent allowed by applicable law, this Guarantee is only made to you, the rst user of the
Hardware Device, and there are no third party beneciaries of this Guarantee. It is not intended for and does not apply
to anyone else (except as required by law).
GOVERNING LAW. If you acquired the Hardware Device in the United States of America, the laws of the State of Florida,
U.S.A., apply to this agreement.
QUESTIONS. Should you have any questions concerning this agreement, or if you desire to contact Direct2Data
Technologies for any reason, please use the address information enclosed in this Hardware Device to contact
Direct2Data Technologies, or visit Direct2Data Technologies on the World Wide Web at http://www.Direct2Data.com/.
PACKAGE CONTENTS
• D2D™ Wireless 1500WR Wireless Router
AC Power Adapter
• Manual and Driver on CD ROM
• Latest software always on-line at www.direct2data.com
SYSTEM REQUIREMENTS
• Microsoft™ Windows XP or 2000
• Minimum 300MHz processor or better
• Minimum 128 Mb Ram
ParkerVision Horizons 1500WR Wireless Router works with any 802.11b/802.11g-compatible Wireless LAN network,
communicating with other computers using either a wireless 802.11b/802.11g interface, or with hard-wired PC laptop/
desktops with an available LAN Port, 300 MHz or better processor & 128 Mb of RAM, running Microsoft™ Windows
2000 or XP.
This product is available for purchase in the U.S. only.
CUSTOMER SUPPORT
You can access customer support 24 hours a day online at www.direct2data.com. This is the quickest way to access:
• Troubleshooting Guides
• Manuals
Answers to Frequently Asked Questions
• Updated Drivers
You can also request help by sending an email to support@direct2data.com or calling
customer support directly at 1-800-231-1759.
Horizons 1500WR Wireless 4-Port Router
5
ParkerVision
Table of Contents
Copyright ...................................................................................................................................................2
Federal Communications Commission(FCC) Interference Statement..................................................2
Limited Warranty.......................................................................................................................................3
Customer Support......................................................................................................................................4
Introduction.............................................................................................................................................6
PART I. GETTING STARTED ......................................................................................................................7
Chapter 1 Getting to Know Your Horizons Wireless 1500WR Wireless Router.....................................8
1.1 Introduction..............................................................................................................................8
1.2 Features of the Horizons Wireless 1500WR Wireless Router .................................................8
1.3 Applications .............................................................................................................................8
Chapter 2 Software Installation ...............................................................................................................10
2.1 Installing the Horizons USB Software .....................................................................................10
2.2 Important Windows XP Information........................................................................................... 13
Chapter 3 ParkerVision Horizons 1500WR Wireless Router Hardware Installation.........................15
3.1 System Requirements...............................................................................................................15
3.2 Installing the Horizons 1500WR Wireless Router....................................................................15
PART II. ADVANCED MANAGEMENT ...................................................................................................17
Chapter 4 D2D/Horizons Management Utility.....................................................................................18
4.1 Conguration.............................................................................................................................18
4.2 Using the D2D/Horizons Management Utility .........................................................................19
4.3 Available Connections Section .................................................................................................20
4.4 Current Connection Selection....................................................................................................21
4.5 Access Tray Section.................................................................................................................. 21
4.6 AD-HOC and AP Modes.......................................................................................................... 22
4.7 SSID......................................................................................................................................... 23
4.8 WEP Encryption ...................................................................................................................... 23
PART III. ADDITIONAL INFORMATION...............................................................................................24
Chapter 5 - Troubleshooting ....................................................................................................................25
Appendix A - Network Conguration.....................................................................................................28
Appendix B - Hardware Specication.....................................................................................................31
Appendix C - Uninstalling the D2D Horizons Software .......................................................................32
Index.................................................................................................................................................................35
Glossary ...........................................................................................................................................................37
Horizons 1500WR Wireless 4-Port Router
6
ParkerVision
INTRODUCTION
All ParkerVision Horizons products are designed and manufactured by Direct2Data Technologies.
Products are fully compliant with IEEE 802.11b standards and are optimized to provide maximum
possible speed and bandwidth through your Internet connection for fastest uploads and downloads.
The distance capabilities of your wireless network equipment directly affect your signal quality. Distance
capabilities are usually stated in terms of outdoor, open eld reach. However, this reach is greatly
diminished indoors by walls, doors, construction techniques and appliances that may block the radio
signal. A wireless network adapter that tests outdoors at 200 feet could, in an indoor environment, provide
20 feet in one direction and as little as 5 or 10 feet in another direction. Factors such as building materials,
oor plans and furnishings can greatly impact the signal range, quality and rate of data transmission. The
extent to which your signal is affected varies greatly depending on your environment.
Wireless network products powered by D2D technology will provide better performance than other
products because they can achieve open eld distances of up to one mile, (when a D2D enabled adapter
is used in conjunction with a D2D enabled base station). The D2D adapter alone provides 3 to 7 times the
distance of other leading brands. This is sufcient to reach all rooms in most homes or small ofces.
Horizons 1500WR Wireless 4-Port Router
7
ParkerVision
The following chapters are structured as a step-by-step
guide to help you connect, install and setup your
ParkerVision Horizons 1500WR Wireless Router.
Part I
Getting Started
Horizons 1500WR Wireless 4-Port Router
8
ParkerVision
Chapter 1
Getting to Know Your ParkerVision Horizons 1500WR Wireless Router
This chapter introduces the main features of the ParkerVision Horizons 1500WR Wireless Router
1.1 Introduction
The ParkerVision Horizons 1500WR Wireless Router provides wireless connectivity. As an
Internet gateway, your 1500WR Wireless Router can share an Internet connection (through
a cable or xDSL modem) with multiple computers using SUA/NAT and DHCP. The 1500WR
Wireless Router offers highly secured wireless connectivity to your wired network with IEEE
802. lx, WEP data encryption and MAC address ltering.
The 1500WR Wireless Router is easy to install and congure. The embedded web-based
congurator and SNMP network management enables remote conguration and management of
your 1500WR Wireless Router.
1.2 Features of the ParkerVision Horizons PC 1500WR Wireless Router
The following are the essential features of the ParkerVision Horizons 1500WR Wireless Router .
4-Port Switch
A combination of switch and router makes your 1500WR Wireless Router a cost-effective and viable
network solution. You can connect up to four computers to the LAN ports on you 1500WR Wireless
Router without the cost of a hub.
10/100M Auto-negotiating Ethernet/Fast Ethernet Interface
This auto-negotiating feature allows the 1500WR Wireless Router to detect the speed of incoming
transmissions and adjust appropriately without manual intervention. It allows data transfer of either
10 Mbps or 100 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network.
10/100M Auto-crossover Ethernet/Fast Ethernet Interface.
The LAN interface automatically adjusts to either a crossover or straight-through Ethernet
cable. 10/100 Mbps Ethernet WAN.
The 10/100 Mbps Ethernet WAN port attaches to the Internet via broadband modem or
router.
Reset Button
The 1500WR Wireless Router reset button is built into the side panel. Use this button to restore the
factory default password to 1234; IP address to 192.168.1.1, subnet mask to 255.255.255.0 and
DHCP sever enabled with a pool of 32 IP addresses starting at 192.168.1.33.
Brute-Force Password Guessing Protection
The 1500WR Wireless Router has a special protection mechanism to discourage brute-force
password guessing attacks on the 1500WR Wireless Router’s management interfaces. You
can specify a wait-time that must expire before entering a fourth password after three incorrect
passwords have been entered. Please see the appendix for details about this feature.
Horizons 1500WR Wireless 4-Port Router
9
ParkerVision
1500WR Wireless Router LED
The blue 1500WR Wireless Router LED (also known as the Breathing LED) is on when the 1500WR Wireless
Router is on and blinks (or breaths) when data is being transmitted to/from its wireless stations. You may use
the web congurator to turn this LED off even when the 1500WR Wireless Router is on and data is being
transmitted/received.
802.11b Wireless LAN Standard
1500WR Wireless Router products containing the letter “B” in the model name, such as 1500WR Wireless Router
B-2000, 1500WR Wireless Router B-2000 v.2, comply with the 802.1 lb wireless standard.
The 802.1 lb data rate and corresponding modulation techniques are as follows. The modulation technique
denes how bits are encoded onto radio waves.
Output Power Management
Power Management is the ability to set the level of output power.
There may be interference or difculty with channel assignment when there is a high density of APs
within a coverage area. In this case you can lower the output power of each Wireless Router, thus
enabling you to place Wireless Routers closer together.
Limit the number of Client Connections
You may set a maximum number of wireless stations that may connect to the 1500WR Wireless
Router. This may be necessary if for example, there is difculty with channel assignment due to a high
density of APs within a coverage area.
SSL Passthrough
SSL (Secure Sockets Layer) uses a public key to encrypt data that’s transmitted over an SSL
connection. Both Netscape Navigator and Internet Explorer support SSL, and many web sites use the
protocol to obtain condential user information, such as credit card numbers. By convention, URLs
that require an SSL connection start with “https” instead of “http”. The 1500WR Wireless Router allows
SSL connections to take place through the 1500WR Wireless Router.
Firewall
The 1500WR Wireless Router employs a stateful inspection rewall with DoS (Denial of Service)
protection. By default, when the rewall is activated, all incoming trafc from the WAN to the LAN is
blocked unless it is initiated from the LAN. The 1500WR Wireless Router rewall supports TCP/UDP
inspection, DoS detection and prevention, real time alerts, reports and logs.
IEEE 802.1 x Network Security
The 1500WR Wireless Router supports the IEEE 802. lx standard to enhance user authentication.
Use the built-in user prole database to authenticate up to 32 users using MD5 encryption. Use an
EAP-compatible RADIUS (RFC2138,2139 - Remote Authentication Dial In User Service) server to
authenticate a limitless number of users using EAP (Extensible Authentication Protocol). EAP is an
authentication protocol that supports multiple types of authentication.
Wireless LAN MAC Address Filtering
Your 1500WR Wireless Router checks the MAC address of the wireless station against a list of
allowed or denied MAC addresses.
Universal Plug and Play (UPnP)
Using the standard TCP/IP protocol, the 1500WR Wireless Router and other UPnP-enabled devices
can dynamically join a network, obtain an IP address and convey its capabilities to other devices on
the network.
Horizons 1500WR Wireless 4-Port Router
10
ParkerVision
Dynamic DNS Support
With Dynamic DNS support, you can have a static hostname alias for a dynamic IP address, allowing
the host to be more easily accessible from various locations on the Internet. You must register for this
service.
PPPoE Support (RFC2516)
PPPoE (Point-to-Point Protocol over Ethernet) emulates a dial-up connection. It allows your ISP to
use their existing network conguration with newer broadband technologies such as ADSL. The PPPoE
driver on the 1500WR Wireless Router is transparent to the computers on the LAN, which see only
Ethernet and are not aware of PPPoE thus saving you from having to manage PPPoE clients on
individual computers.
PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data
from a remote client to a private server, creating a Virtual Private Network (VPN) using a TCP/IP-based
network. PPTP supports on-demand, multi-protocol and virtual private networking over public networks,
such as the Internet. Use PPTP to connect to a broadband modem to achieve access to high-speed
data networks via a familiar “dial-up networking” user interface.
Network Address Translation (NAT)
NAT (Network Address Translation - NAT, RFC 1631) allows the translations of multiple IP addresses
used within one network to different IP addresses known within another network.
NAT for Single-IP-address Internet Access
The 1500WR Wireless Router’s SUA (Single User Account) feature allows multiple-user Internet
access for the cost of a single IP account. NAT supports popular Internet applications such as MS
traceroute, CuSeeMe, IRC, RealPlayer, VDOLive, Quake, and PPTP. No conguration is needed
to support these applications.
DHCP (Dynamic Host Conguration Protocol)
DHCP (Dynamic Host Conguration Protocol) allows the individual clients (computers) to obtain the
TCP/IP conguration at start-up from a centralized DHCP server. The 1500WR Wireless Router has
built-in DHCP server capability enabled by default. It can assign IP addresses, an IP default gateway
and DNS servers to DHCP clients. The 1500WR Wireless Router also acts as a surrogate DHCP
server (DHCP Relay) where it relays IP address assignment from the actual real DHCP server to the
clients.
Multicast
Traditionally, IP packets are transmitted in two ways - unicast or broadcast. Multicast is a third way
to deliver IP packets to a group of hosts. IGMP (Internet Group Management Protocol) is the protocol
used to support multicast groups. The latest version is version 2 (see RFC 2236). The 1500WR
Wireless Router supports versions 1 and 2.
IP Alias
IP Alias allows you to partition a physical network into logical networks over the same Ethernet
interface. The 1500WR Wireless Router supports three logical LAN interfaces via its single physical
Ethernet LAN interface with the 1500WR Wireless Router itself as the gateway for each LAN network.
IP Policy Routing
IP Policy Routing provides a mechanism to override the default routing behavior and alter
packet forwarding based on the policies dened by the network administrator.
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging management
information between network devices. SNMP is a member of the TCP/IP protocol suite. Your
Horizons 1500WR Wireless 4-Port Router
11
ParkerVision
1500WR Wireless Router supports SNMP agent functionality, which allows a manger station to manage and
monitor the SNMP - Continued
1500WR Wireless Router through the network. The 1500WR Wireless Router supports SNMP version
one (SNMPvl) and version two c (SNMPv2c).
Full Network Management
The embedded web congurator is an all-platform web-based utility that allows you to easily access the
1500WR Wireless Routers management settings. Most functions of the 1500WR Wireless Router are
also software congurable via the SMT(System Management Terminal) interface. The SMT is a menu-
driven interface that you can access from a terminal emulator through the console port or over a telnet
connection.
• Logging and Tracing
Built-in message logging and packet tracing.
Unix syslog facility support.
• Diagnostics Capabilities
The 1500WR Wireless Router can perform self-diagnostic tests. These tests check the integrity of the
following circuitry:
FLASH memory
DRAM
LAN port
Wireless port
Embedded FTP and TFTP Servers
The 1500WR Wireless Routers embedded FTP and TFTP servers enable fast rmware upgrades as
well as conguration le backups and restoration.
Wireless Association List
With the Wireless Association List, you can see the list of the wireless stations that are currently using
the 1500WR Wireless Router to access your wired network.
Wireless LAN Channel Usage
The Wireless Channel Usage displays whether the radio channels are used by other wireless devices
within the transmission range of the 1500WR Wireless Router. This allows you to select the channel
with minimum interference for your 1500WR Wireless Router.
Horizons 1500WR Wireless 4-Port Router
12
ParkerVision
1.3 Application for the 1500WR Wireless Router
Here is an application example of what you can do with your 1500WR Wireless Router.
1.3.1 Internet Access Application
Add a wireless LAN to your existing network without expensive network cables. Wireless stations can
move freely anywhere in the coverage area and use resources on the wired network.
Horizons 1500WR Wireless 4-Port Router
13
ParkerVision
1.4 Installing Your 1500WR Wireless Router
This section will show you how to physically hook up your 1500WR Wireless Router.
1.4.1 Installation Options
The 1500WR is a powerful, feature-rich wireless router that can be used in a variety of installation
schemes.
The following sections will detail the most common installation schemes. More advanced setups are
explained in detail in later chapters of this manual.
1.4.2 Box Contents
The box your 1500WR came in should contain the following items:
• 1500WR Wireless Router Unit
Two Antennas
• One AC Power Adapter
• Printed Quick Start Guide
• CD ROM containing the electronic version of this manual
1.4.3 What You Will Need to Install and Setup the 1500WR
It is possible to setup the 1500WR using an existing Wi-Fi connected computer or laptop. However, for
security reasons it is advised that you perform the initial setup using a computer that is connected to
the 1500WR with a common CAT-5 Ethernet Cable, as shown below.
Horizons 1500WR Wireless 4-Port Router
14
ParkerVision
1.4.3 Connecting the 1500WR to Your Computer for Initial Conguration
The rear panel of the 1500WR contains several ports, as described below:
For initial setup, you should have:
The power adpater plugged into the 1500WR as shown, and this adapter plugged into a surge-
protected electrical outlet
Your Cable or DSL modem’s Ethernet cable plugged into the Internet In port as shown above
An Ethernet cable plugged into the router port 1 as shown above, and the other end of this cable
plugged into your computer’s Ethernet port
Now Proceed to the Next Page to Begin Setting Up Your 1500WR
Plug the AC Adapter
into this port.
Plug your computer’s Ethernet
cable into Port 1. The
remaining ports can to be used
with other computers in a hard-
wired router fashion
Plug your cable or DSL
modem’s Ethernet
Cable into this port
Horizons 1500WR Wireless 4-Port Router
15
ParkerVision
Chapter 2
Introducing the Web Conguration Utility
This chapter describes how to access the 1500WR Wireless Router web Web Conguration Utility and
provides an overview of its screens.
2.1 Web Web Conguration Utility Overview
The web Web Conguration Utility makes it easy to congure and manage the 1500WR Wireless
Router. The screens you see in the web Web Conguration Utility may vary somewhat from the ones
shown in this document due to differences between individual 1500WR Wireless Router models or
rmware versions.
2.2 Accessing the 1500WR Wireless Router Web Web Conguration Utility
Step 1. Make sure your 1500WR Wireless Router hardware is properly connected (refer to the
Chapter 1 of this manual).
Step 2. Prepare your computer to connect to the 1500WR Wireless Router (refer to the Setting Up
Your Computer’s IP Address appendix).
Step 3. Launch your web browser. Step 4. Type “http://192.168.1.1” as the URL Address eld.
Step 5. Type “1234” (default) as the password and click Login. In some versions, the default
password appears automatically - if this is the case, click Login.
Step 6. You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to conrm) and click Apply or click Ignore
to allow access without password change.
Note - If the default password
of “1234” is not accepted,
refer to the next page of this
manual and go through the
reset procedure to set all
parameters back to factory
defaults.
Then try the above steps
again.
Horizons 1500WR Wireless 4-Port Router
16
ParkerVision
2.2 Accessing the 1500WR Wireless Router Web Web Conguration Utility - Continued
Step 7. You should now see the MAIN MENU screen.
The 1500WR Wireless Router automatically times out after ve minutes of inactivity.
Simply log back into the 1500WR Wireless Router if this happens to you.
2.3 Resetting the 1500WR Wireless Router
If you forget your password or cannot access the 1500WR Wireless Router, you will need to reload the
factory-default conguration le or use the RESET button on the side panel of the 1500WR Wireless
Router. Uploading this conguration le replaces the current conguration le with the factory-default
conguration le. This means that you will lose all congurations that you had previously and the
speed of the console port will be reset to the default of 9600bps with 8 data bit, no parity, one stop bit
and ow control set to none. The password will be reset to “1234”, also.
2.3.1 Procedure to Use the Reset Button
Make sure the SYS LED is on (not blinking) before you begin this procedure.
Step 1. Press the RESET button for more than ve seconds, and then release it. If the SYS LED
begins to blink, the defaults have been restored and the 1500WR Wireless Router restarts.
Otherwise, go to step 2.
Step 2. Turn the 1500WR Wireless Router off.
Step 3. While pressing the RESET button, turn the 1500WR Wireless Router on.
Step 4. Continue to hold the RESET button. The SYS LED will begin to blink and icker very quickly
after about 10 or 15 seconds. This indicates that the defaults have been restored and the
1500WR Wireless Router is now restarting.
Step 5. Release the RESET button and wait for the 1500WR Wireless Router to nish restarting.
2.3.2 Uploading a Conguration File via Console Port
This method is only applicable to 1500WR Wireless Router models with a console port
.
Step 1. Download the default conguration le from the 1500WR Wireless Router FTP site, unzip it
and save it in a folder.
Step 2. Turn off the 1500WR Wireless Router, begin a terminal emulation software session and turn
on the 1500WR Wireless Router again.
When you see the message “Press any key to enter Debug Mode within 3 seconds”, press
any key to enter debug mode.
Step 3. Enter “y” at the prompt below to go into debug mode. Step 4. Enter “atlc” after “Enter
Debug Mode” message.
Step 5. Wait for “Starting XMODEM upload” message before activating Xmodem upload on your
terminal. This is an example Xmodem conguration upload using HyperTerminal.
Continued on next page
Horizons 1500WR Wireless 4-Port Router
17
ParkerVision
2.3.2 Uploading a Conguration File via Console Port - Continued
Step 6. Click Transfer, then Send File to display the following screen.
Step 7. After successful rmware upload, enter “atgo” to restart the 1500WR Wireless Router.
2.4 Navigating the 1500WR Wireless Router Web Web Conguration Utility
The following summarizes how to navigate the web Web Conguration Utility from the MAIN MENU
screen. Follow the instructions you see in the MAIN MENU screen or click the IBs] icon (located in
the top right corner of most screens) to view online help.
Horizons 1500WR Wireless 4-Port Router
18
ParkerVision
This chapter provides information on the Wizard Setup screens in the web Web Conguration Utility.
3.1 Wizard Setup Overview
The web Web Conguration Utility’s setup wizard helps you congure your 1500WR Wireless Router
for Internet access and set up wireless LAN.
3.1.1 Channel
The range of radio frequencies used by IEEE 802.1 lb wireless devices is called a “channel”.
Channels available depend on your geographical area. You may have a choice of channels (for
your region) so you should use a different channel than an adjacent AP (Wireless Router) to reduce
interference. Interference occurs when radio signals from different Wireless Routers overlap causing
interference and degrading performance.
Adjacent channels partially overlap however. To avoid interference due to overlap, your AP should be
on a channel at least ve channels away from a channel that an adjacent AP is using. For example,
if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a
channel between 6 or 11.
The 1500WR Wireless Router’s “Scan” function is especially designed to automatically scan for a
channel with the least interference.
3.1.2 ESS ID
An Extended Service Set (ESS) is a group of Wireless Routers or wireless gateways connected to
a wired LAN on the same subnet. An ESS ID uniquely identies each set. All Wireless Routers or
wireless gateways and their associated wireless stations in the same set must have the same ESSID.
3.1.3 WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network.
WEP encryption scrambles the data transmitted between the wireless stations and the Wireless
Routers to keep network communications private. It encrypts unicast and multicast communications
in a network. Both the wireless stations and the Wireless Routers must use the same WEP key for
data encryption and decryption.
Chapter 3
Wizard Setup
Horizons 1500WR Wireless 4-Port Router
19
ParkerVision
3.2 Wizard Setup: General Setup
General Setup contains administrative and system-related information.
The following table describes the labels in this screen.
LABEL DESCRIPTION
System Name It is recommended you type your computer’s “Computer name”, some ISPs check this name
you should enter your computer’s “Computer Name”.
> In Windows 2000, click Start, Settings, Control Panel and then double-click System.
Click the Network Identication tab and then the Properties button. Note the entry for the
Computer name eld and enter it as the System Name.
> In Windows XP, click Start, My Computer, View system information and then click the
Computer Name tab. Note the entry in the Full computer name eld and enter it as the
1500WR Wireless Router System Name.
This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but
dashes”-” and underscores”_” are accepted.
Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. Type the
domain name (if you know it) here. If you leave this eld blank, the ISP may assign a domain
name via DHCP. The domain name entered by you is given priority over the ISP assigned
domain name.
Next Click Next to proceed to the next screen.
Horizons 1500WR Wireless 4-Port Router
20
ParkerVision
3.3 Wizard Setup: Wireless LAN Setup
Set up your wireless LAN using the second wizard screen.
LABEL DESCRIPTION
ESSID Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN.
If you change this eld on the 1500WR Wireless Router, make sure all wireless stations use
the same ESSID in order to access the network.
Choose
Channel ID
To manually set the 1500WR Wireless Router to use a channel, select a channel from the
drop-down list box. Open the Channel Usage Table screen to make sure the channel is not
already used by another AP or independent peer-to-peer wireless network.
To have the 1500WR Wireless Router automatically select a channel, click Scan instead.
Scan
Click this button to have the 1500WR Wireless Router automatically scan for and select a
channel with the least interference.
WEP
Encryption
Select Disable allows all wireless computers to communicate with the Wireless Routers
without any data encryption.
Select 64-bit WEP or 128-bit WEP to allow data encryption.
ASCII Select this option in order to enter ASCII characters as the WEP keys.
HEX Select this option to enter hexadecimal characters as the WEP keys.
The preceding “Ox” is entered automatically. Leave this in front of
your key.
Key 1 to Key 4 used to encrypt data. Both the 1500WR Wireless Router and the wireless stations must use
the same WEP key for data transmission.
If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters
(“0-9”, “A-F”). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters (“0-9”, “A-F”).
You must congure all four keys, but only one key can be activated at any one time. The
default key is key 1.
Next Click Next to continue.
Back Click Back to return to the previous screen.
Refer to the chapter on wireless LAN for more information.
Horizons 1500WR Wireless 4-Port Router
21
ParkerVision
3.4 Wizard Setup: ISP Parameters
The 1500WR Wireless Router offers three choices of encapsulation. They are Ethernet, PPTP or
PPPoE. The screen varies depending upon the type chosen.
3.4.1 Ethernet
The following table describes the labels in this screen.
LABEL DESCRIPTION
ISP Parameters for Internet Access
Encapsulation You must choose the Ethernet option when the WAN port is used as a regular
Ethernet. Otherwise, choose PPPoE or PPTP for a dial-up connection.
Service Type Select from Standard, RR-Toshiba (RoadRunner Toshiba authentication method),
RR-Manager (Roadrunner Manager authentication method), RR-Telstra or Telia
Login. Choose a Roadrunner service type if your ISP is Time Warner’s Roadrunner;
otherwise choose Standard.
The User Name, Password and Login Server IP Address elds are not applicable
(N/A) for the Standard service type.
Continued next page
Horizons 1500WR Wireless 4-Port Router
22
ParkerVision
3.4.1 Wizard Setup - Ethernet - Continued
LABEL DESCRIPTION
User Name Type the username given to you by your ISP.
Password Type the password associated with the username above.
Login Server IP
Address
The 1500WR Wireless Router will nd the Roadrunner Server IP if this eld is left
blank. If it does not, then you must enter the authentication server IP address.
Login Server (Telia
Login only)
Type the domain name of the Telia login server, for example “logini .telia.com”.
This eld is not available on all models.
Relogin Every(min)
(Telia Login only)
The Telia server logs the 1500WR Wireless Router out if the 1500WR Wireless
Router does not log in periodically. Type the number of minutes from 1 to 59 (30
recommended) for the 1500WR Wireless Router to wait between logins.
This eld is not available on all models.
Next Click Next to proceed to the next page.
Back Click Back to go back to the previous page.
3.4.2 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from
a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based
networks.
PPTP supports on-demand, multi-protocol, and virtual private networking over public networks, such
as the Internet.
Refer to the appendix for more information on PPTP.
The 1500WR Wireless Router supports one PPTP server connection at any given time.
Horizons 1500WR Wireless 4-Port Router
23
ParkerVision
3.4.2 PPTP Encapsulation - Continued
The following table describes the labels in the screen on the previous page.
LABEL DESCRIPTION
ISP Parameters for Internet Access
Encapsulation Select PPTP from the drop-down list box.
User Name Type the user name given to you by your ISP. Most home user will need to use their
name with their domain designation, such as user@bellsouth.net
Password Type the password associated with the User Name above.
Nailed Up
Connection
Select Nailed Up Connection if you do not want the connection to time out.
Idle Timeout Type the time in seconds that elapses before the 1500WR Wireless Router
automatically disconnects from the PPTP server.
PPTP Conguration
My IP Address Type the (static) IP address assigned to you by your ISP.
My IP Subnet
Mask
Type the subnet mask assigned to you by your ISP (if given).
Server IP Address Type the IP address of the PPTP server.
Connection
ID/Name
If your ISP has provided a connection ID name, enter it in this eld exactly as
provided.
Next Click Next to continue.
Back Click Back to return to the previous screen.
3.4.3 PPPoE Encapsulation
Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection. PPPoE is an IETF
(Internet Engineering Task Force) draft standard specifying how a host personal computer interacts
with a broadband modem (for example xDSL, cable, wireless, etc.) to achieve access to high-speed
data networks. It preserves the existing Microsoft Dial-Up Networking experience and requires no
new learning or procedures.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for instance, RADIUS). For the user, PPPoE provides a login and
authentication method that the existing Microsoft Dial-Up Networking software can activate, and
therefore requires no new learning or procedures for Windows users.
One of the benets of PPPoE is the ability to let end users access one of multiple network services,
a function known as dynamic service selection. This enables the service provider to easily create and
offer new IP services for specic users.
Operationally, PPPoE saves signicant effort for both the subscriber and the ISP/carrier, as it requires
no specic conguration of the broadband modem at the subscriber’s site.
By implementing PPPoE directly on the 1500WR Wireless Router (rather than individual computers),
the computers on the LAN do not need PPPoE software installed, since the 1500WR Wireless
Router does that part of the task. Furthermore, with NAT, all of the LAN’s computers will have Internet
access.
Refer to the appendix for more information on PPPoE, and to the next page for setup details.
Horizons 1500WR Wireless 4-Port Router
24
ParkerVision
3.4.3 PPPoE Encapsulation - Continued
PPoE Wizard Setup Screen
The following table describes the labels in this screen.
LABEL DESCRIPTION
ISP Parameter for Internet Access
Encapsulation Choose an encapsulation method from the pull-down list box. PPPoE forms a dial-up
connection.
Service Name Type the name of your service provider.
User Name Type the user name given to you by your ISP.
Password Type the password associated with the user name above.
Nailed Up
Connection
Select Nailed Up Connection if you do not want the connection to time out.
Idle Timeout Type the time in seconds that elapses before the 1500WR Wireless Router automatically
disconnects from the PPPoE server.
Next Click Next to continue.
Back Click Back to return to the previous screen.
Horizons 1500WR Wireless 4-Port Router
25
ParkerVision
3.5 Wizard Setup: WAN and DNS
The fourth wizard screen allows you to congure WAN IP address assignment, DNS server address
assignment and the WAN MAC address.
3.5.1 WAN IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated from the
Internet, for instance, only between your two branch ofces, you can assign any IP addresses to the
hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the
following three blocks of IP addresses specically for private networks.
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private network.
If you belong to a small organization and your Internet access is through an ISP, the ISP can provide
you with the Internet addresses for your local networks. On the other hand, if you are part of a much
larger organization, you should consult your network administrator for the appropriate IP addresses.
Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment,
please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
3.5.2 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a LAN
share one common network number. Where you obtain your network number depends on your
particular situation. If the ISP or your network administrator assigns you a block of registered IP ad-
dresses, follow their instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single user
account and the ISP will assign you a dynamic IP address when the connection is established. If this
is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0
and you must enable the Network Address Translation (NAT) feature of the 1500WR Wireless Router.
The Internet Assigned Number Authority (IANA) reserved this block of addresses specically for
private use; please do not use any other number unless you are told otherwise. Let’s say you select
192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to
192.168.1.254 (zero and 255 are reserved). In other words, the rst three numbers specify the net-
work number while the last number identies an individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember, for
instance, 192.168.1.1, for your 1500WR Wireless Router, but make sure that no other device on your
network is using that IP address.
The subnet mask species the network number portion of an IP address. Your 1500WR Wireless
Router will compute the subnet mask automatically based on the IP address that you entered. You
don’t need to change the subnet mask computed by the 1500WR Wireless Router unless you are
instructed to do otherwise.
Horizons 1500WR Wireless 4-Port Router
26
ParkerVision
3.5.3 DNS Server Address Assignment
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice
versa. For instance, the IP address of a web site with an URL of www.anycompany.com could be
192.168.3.1. The DNS server is extremely important because without it, you must know the IP ad-
dress of a computer before you can access it.
There are two ways that an ISP disseminates the DNS server addresses.
1. The ISP tells you the DNS server addresses, usually in the form of an information sheet, when
you sign up. If your ISP gives you DNS server addresses, enter them in the DNS Server elds
in DHCP Setup.
2. Leave the DNS Server elds in DHCP Setup blank (for example 0.0.0.0). The 1500WR Access
Point acts as a DNS proxy when this eld is blank.
3.5.4 WAN MAC Address
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is as-
signed at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:
00:02.
You can congure the WAN port’s MAC address by either using the factory default or cloning the
MAC address from a workstation on your LAN. Once it is successfully congured, the address will be
copied to the “rom” le (ZyNOS conguration le). It will not change unless you change the setting or
upload a different “rom” le.
ParkerVision recommends you clone the MAC address from a workstation on your LAN even if your
ISP does not require MAC address authentication.
Your 1500WR Wireless Router WAN port is always set at half-duplex mode as most cable/DSL mo-
dems only support half-duplex mode. Make sure your modem is in half-duplex mode. Your 1500WR
Wireless Router supports full duplex mode on the LAN side.
Example of Network Properties for LAN Servers with Fixed IP Addresses:
Choose an IP address 192.168.1.2-192.168.1.32; 192.168.1.65-192.168.1.254.
Subnet mask 255.255.255.0
Gateway (or default route) 192.168.1.1(1500WR Wireless RouterLANIP)
Horizons 1500WR Wireless 4-Port Router
27
ParkerVision
3.5.4 WAN MAC Address - Continued
The following table describes the labels in the screen above.
LABEL DESCRIPTION
WAN IP Address Assignment
Get automatically from ISP Select this option If your ISP did not assign you a xed IP address. This is the default selection.
Use xed IP address Select this option If the ISP assigned a xed IP address.
My WAN IP Address Enter your WAN IP address in this eld if you selected Use Fixed IP Address.
My WAN IP Subnet Mask Enter the IP subnet mask in this eld if you selected Use Fixed IP Address. This eld is not available when you
select PPPoE encapsulation in the previous wizard screen.
Gateway IP Address Enter the gateway IP address in this eld if you selected Use Fixed IP Address. This eld is not available when
you select PPPoE encapsulation in the previous wizard screen.
DNS Server Address Assignment
Get automatically from ISP Select this option if your ISP does not give you DNS server addresses. This option is selected by default.
Use xed IP address -DNS
Server IP Address
Select this option If your ISP provides you a DNS server address.
Primary/Secondary DNS
Server If you selected the Use xed IP address - Primary/Secondary DNS Server
option, enter the provided DNS addresses in these elds.
WAN MAC Address: The MAC address eld allows you to congure the WAN port’s MAC address by either using the factory default or cloning
the MAC address from a workstation on your LAN.
Factory Default Select this option to use the factory assigned default MAC address.
Spoof this Computer’s MAC
address - IP Address
Select this option and enter the IP address of the computer on the LAN whose MAC address you are cloning. Once
it is successfully congured, the MAC address will be copied to the rom le (ZyNOS conguration le). It will not
change unless you change the setting or upload a different rom le. It is advisable to clone the MAC address from a
computer on your LAN even if your ISP does not presently require MAC address authentication.
Back Click Back to return to the previous screen.
Next Click Next to continue.
Horizons 1500WR Wireless 4-Port Router
28
ParkerVision
3.6 Basic Setup Complete
Click Finish to complete and save the wizard setup.
If you are currently using a wireless (LAN) adapter to access this Horizons Router/Wireless Router
and you made changes to the ESSID, then you will need to make the same changed to your wireless
(LAN) adapter after you click the Finish button.
Horizons 1500WR Wireless 4-Port Router
29
ParkerVision
This part discusses the System, LAN, and Wireless Setup Screens
Part II
System, LAN, and Wireless
Horizons 1500WR Wireless 4-Port Router
30
ParkerVision
This chapter provides information on the System screens.
4.1 System Overview
This section provides information on general system setup.
4.2 Conguring General Setup
Click ADVANCED and then SYSTEM to open the General screen.
The table on the next page describes the labels in the above screen.
Chapter 4
System Screens
Horizons 1500WR Wireless 4-Port Router
31
ParkerVision
4.2 Conguring General Setup - Continued
LABEL DESCRIPTION
System Name Type a descriptive name for identication purposes. Some ISPs check this name, so it is
recommended you enter your computer’s “Computer name”
This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes”-” and
underscores”_” are accepted.
Domain Name Type the domain name (if you know it) here. If you leave this eld blank, the ISP may assign a
domain name via DHCP. The domain name entered by you is given priority over the ISP assigned
domain name.
Administrator
Inactivity Timer
Type how many minutes a management session (either via the web web conguration utility or SMT)
can be left idle before the session times out.
The default is 5 minutes. After it times out you have to log in with your password again. Very long idle
timeouts may have security risks.
A value of “0” means a management session never times out, no matter how long it has been left idle
(not recommended).
System DNS Servers
First DNS Server
Second DNS
Server
Third DNS Server
Select From ISP if your ISP dynamically assigns DNS server information (and the Horizons’s WAN IP
address). The eld to the right displays the (read-only) DNS server IP address that the ISP assigns.
Select User-Dened if you have the IP address of a DNS server. Enter the DNS server’s IP address in
the eld to the right. If you chose User-Dened, but leave the IP address set to 0.0.0.0, User-Dened
changes to None after you click Apply. If you set a second choice to User-Dened, and enter the
same IP address, the second User-Dened changes to None after you click Apply.
Select None if you do not want to congure DNS servers. If you do not congure a DNS server, you
must know the IP address of a machine in order to access it.
Apply Click Apply to save your changes back to the Horizons.
Reset Click Reset to reload the previous conguration for this screen.
4.3 Dynamic DNS
Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS
services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your
FTP server or web site on your own computer using a DNS-like address (for instance myhost.dhs.org,
where myhost is a name of your choice) that will never change instead of using an IP address that
changes each time you reconnect. Your friends or relatives will always be able to call you even if they
don’t know your IP address.
First of all, you need to have registered a dynamic DNS account with www.dyndns.org. This is for
people with a dynamic IP from their ISP or DHCP server that would still like to have a DNS name. The
dynamic DNS service provider will give you a password or key.
4.3.1 DYNDNS Wildcard
Enabling the wildcard feature for your host causes *.yourhost.dyndns.org to be aliased to the same
IP address as yourhost.dyndns.org. This feature is useful if you want to be able to use, for example,
www.yourhost.dyndns.org and still reach your hostname.
If you have a private WAN IP address, then you cannot use Dynamic DNS.
Horizons 1500WR Wireless 4-Port Router
32
ParkerVision
4.4 Conguring Dynamic DNS
To change your Horizons’s DDNS, click ADVANCED, SYSTEM and then the DDNS tab. The screen
appears as shown.
The following table describes the labels in this screen.
LABEL DESCRIPTION
Active Select this check box to activate DDNS.
Service Provider Select the name of your DDNS service provider.
DDNS Type Select the type of service that you are registered for from your DDNS service provider.
Options are Dynamic DNS, Static DNS or Custom DNS.
Host Names 1-3 Enter your host names in the three elds provided. You can specify up to two host names in
each eld separated by a comma (“,”).
User Type your user name.
Password Type the password assigned to you.
Enable Wildcard Your Horizons supports DYNDNS wildcard. Select the check box to enable.
Off Line This option is available when CustomDNS is selected in the DDNS Type eld. Check with your
dynamic DNS service provider to have trafc redirected to a URL (that you can specify) while you
are off line.
Edit Update IP Address:
Server Auto Detect Select this option to update the IP address of the host name(s) automatically by the DDNS
server. It is recommended that you select this option.
User Specify Select this option to update the IP address of the host name(s) to the IP address specied
below. Use this option if you have a static IP address.
IP Address Enter the IP address if you select the User Specify option.
Apply Click Apply to save your changes back to the Horizons.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
33
ParkerVision
4.5 Conguring Password
To change your router’s password (recommended), click ADVANCED, SYSTEM and then the
Password tab. The screen appears as shown. This screen allows you to change the router’s password.
If you forget your password (or the Horizons Wireless Routers IP address), you will need to reset the
router or upload the default conguration le via console port. See the Resetting the Wireless Router
section for details.
The following table describes the labels in this screen.
LABEL DESCRIPTION
Old Password Type in your existing system password (1234 is the default password).
New Password Type your new system password (up to 31 characters). Note that as you type a
password, the screen displays an asterisk (*) for each character you type.
Retype to Conrm Retype your new system password for conrmation.
Apply Click Apply to save your changes back to the Horizons Router.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
34
ParkerVision
4.6 Conguring Time Setting
To change your Horizons Routers time and date, click ADVANCED, SYSTEM and then the Time
Setting tab. The screen appears as shown. Use this screen to congure the router time based on your
local time zone.
The following table describes the labels in this screen.
LABEL DESCRIPTION
Time Protocol Select the time service protocol that your time server sends when you turn on the router. Not all time servers support all
protocols, so you may have to check with your ISP/network administrator or use trial and error to nd a protocol that works.
The main difference between them is the format. Daytime (RFC 867) format is day/month/year/time zone of the server.
Time (RFC 868) format displays a 4-byte integer giving the total number of seconds since 1970/1/1 at 0:0:0. The default,
NTP (RFC 1305), is similar to Time (RFC 868). Select None to enter the time and date manually.
Time Server
Address
Enter the IP address or the URL of your time server. Check with your ISP/network administrator if you are unsure of this
information (the default is tick.stdtime.gov.tw).
Current Time (hh:
mm:ss)
This eld displays the time of your Horizons Router. Each time you reload this page, the Horizons Router
synchronizes the time with the time server.
New Time (hh:
mm:ss) This eld displays the last updated time from the time server. When you select None in the Time Protocol eld, enter
the new time in this eld and then click Apply.
Current Date
(yyyy/mm/dd)
This eld displays the date of your Horizons Router. Each time you reload this page, the Horizons Router
synchronizes the time with the time server.
New Date (yyyy/
mm/dd) This eld displays the last updated date from the time server. When you select None in the Time Protocol eld, enter
the new date in this eld and then click Apply.
Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time
(GMT).
Daylight Savings Select this option if you use daylight savings time. Daylight saving is a period from late spring to early fall when many
countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.
Start Date (mm-dd) Enter the month and day that your daylight-savings time starts on if you selected Daylight Savings.
End Date (mm-dd) Enter the month and day that your daylight-savings time ends on if you selected Daylight Savings.
Apply Click Apply to save your changes back to the Horizons Router.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
35
ParkerVision
Chapter 5
LAN Screens
This chapter describes how to congure LAN settings.
5.1 LAN Overview
Local Area Network (LAN) is a shared communication system to which many computers are at-
tached. The LAN screens can help you congure a LAN DHCP server, manage IP addresses, and
partition your physical network into logical networks.
Please see the Wizard Setup chapter for the background information about Primary and Secondary
DNS Server and IP Address and Subnet Mask.
5.2 LANs and WANs
A LAN is a computer network limited to the immediate area, usually the same building or oor of a
building. A WAN (Wide Area Network), on the other hand, is an outside connection to another net-
work or the Internet.
5.2.1 LANs, WANs and the 1500WR Wireless Router
The actual physical connection determines whether the 1500WR Wireless Router ports are LAN or
WAN ports. There are two separate IP networks, one inside, the LAN network; the other outside: the
WAN network as shown next:
Horizons 1500WR Wireless 4-Port Router
36
ParkerVision
5.3 DHCP Setup
DHCP (Dynamic Host Conguration Protocol, RFC 2131 and RFC 2132) allows individual clients to
obtain TCP/IP conguration at start-up from a server. You can congure the 1500WR Wireless Router
as a DHCP server or disable it. When congured as a server, the 1500WR Wireless Router provides
the TCP/IP conguration for the clients. If set to None, DHCP service will be disabled and you must
have another DHCP server on your LAN, or else the computer must be manually congured.
5.4 Factory LAN Defaults
The LAN parameters of the 1500WR Wireless Router are preset in the factory with the following val-
ues:
• IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits)
• DHCP server enabled with 32 client IP addresses starting from 192.168.1.33.
IP Pool Setup
The 1500WR Wireless Router is pre-congured with a pool of 32 IP addresses starting from
192.168.1.33 to 192.168.1.64. This conguration leaves 31 IP addresses (excluding the 1500WR
Wireless Router itself) in the lower range for other server computers, for instance, servers for mail,
FTP, TFTP, web, etc., that you may have.
These parameters should work for the majority of installations. If your ISP gives you explicit DNS
server address(es), read the embedded web Web Conguration Utility help regarding what elds need
to be congured.
5.5 RIP Setup
RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange routing
information with other routers. RIP Direction controls the sending and receiving of RIP packets. When
set to:
1. Both - the 1500WR Wireless Router will broadcast its routing table periodically and incorporate the RIP
information that it receives.
2. In Only - the 1500WR Wireless Router will not send any RIP packets but will accept all RIP packets received.
3. Out Only - the 1500WR Wireless Router will send out RIP packets but will not accept any RIP packets received.
4. None - the 1500WR Wireless Router will not send any RIP packets and will ignore any RIP packets received.
RIP Version controls the format and the broadcasting method of the RIP packets that the 1500WR
Wireless Router sends (it recognizes both formats when receiving). RIP-1 is universally supported; but
RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an
unusual network topology.
Both RIP-2B and RIP-2M send routing data in RIP-2 format; the difference being that RIP-2B uses
subnet broadcasting while RIP-2M uses multicasting. Multicasting can reduce the load on non-router
machines since they generally do not listen to the RIP multicast address and so will not receive the
RIP packets. However, if one router uses multicasting, then all routers on your network must use multi-
casting, also.
By default, RIP Direction is set to Both and RIP Version to RIP-1.
Horizons 1500WR Wireless 4-Port Router
37
ParkerVision
5.6 Multicast
Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender -1 recipient) or
Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the
network - not everybody and not just 1.
IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a
Multicast group - it is not used to carry user data. IGMP version 2 (RFC 2236) is an improvement over ver-
sion 1 (RFC 1112) but IGMP version 1 is still in wide use. If you would like to read more detailed information
about interoperability between IGMP version 2 and version 1, please see sections 4 and 5 of RFC 2236.
The class D IP address is used to identify host groups and can be in the range 224.0.0.0 to
239.255.255.255. The address 224.0.0.0 is not assigned to any group and is used by IP multicast comput-
ers. The address 224.0.0.1 is used for query messages and is assigned to the permanent group of all IP
hosts (including gateways).
All hosts must join the 224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned to
the multicast routers group.
The 1500WR Wireless Router supports both IGMP version 1 (IGMP-vl) and IGMP version 2 (IGMP-v2).
At start up, the 1500WR Wireless Router queries all directly connected networks to gather group member-
ship. After that, the 1500WR Wireless Router periodically updates this information. IP multicasting can be
enabled/disabled on the 1500WR Wireless Router LAN and/or WAN interfaces in the web Web Congura-
tion Utility (LAN; WAN). Select None to disable IP multicasting on these interfaces.
5.7 Conguring the LAN IP Screens
Click ADVANCED and then LAN to open the IP Screen.
This screens options are described on the next page.
Horizons 1500WR Wireless 4-Port Router
38
ParkerVision
5.7 Conguring the LAN IP Screens - Continued
The following table describes the options of the LAN Screen, from the previous page.
LABEL DESCRIPTION
DHCP Setup (refer to your Users Guide for background information)
DHCP Server Select this option to allow your 1500WR Wireless Router to assign IP addresses, an
IP default gateway and DNS servers to Windows 95, Windows NT and other systems
that support the DHCP client.
When DHCP is used, the following items need to be set:
IP Pool Starting
Address
This eld species the rst of the contiguous addresses in the IP address pool.
Pool Size This eld species the size or count of the IP address pool.
DNS Servers Assigned by DHCP Server
First DNS Server
Second DNS
Server
Third DNS Server
Select From ISP if your ISP dynamically assigns DNS server information (and the
1500WR Wireless Router’s WAN IP address). The eld to the right displays the (read-
only) DNS server IP address that the ISP assigns.
Select User-Dened if you have the IP address of a DNS server. Enter the DNS
server’s IP address in the eld to the right. If you chose User-Dened, but leave the
IP address set to 0.0.0.0, User-Dened changes to None after you click Apply.
If you set a second choice to User-Dened, and enter the same IP address, the
second User-Dened changes to None after you click Apply.
Select DNS Relay to have the 1500WR Wireless Router act as a DNS proxy. The
1500WR Wireless Router’s LAN IP address displays in the eld to the right (read-
only). The 1500WR Wireless Router tells the DHCP clients on the LAN that the
1500WR Wireless Router itself is the DNS server. When a computer on the LAN
sends a DNS query to the 1500WR Wireless Router, the 1500WR Wireless Router
forwards the query to the 1500WR Wireless Router’s system DNS server (congured
in the SYSTEM General screen) and relays the response back to the computer. You
can only select DNS Relay for one of the three servers; if you select DNS Relay for a
second or third DNS server, that choice changes to None after you click Apply.
Select None if you do not want to congure DNS servers. If you do not congure a
DNS server, you must know the IP address of a machine in order to access it.
LAN TCP/IP
IP Address Type the IP address of your 1500WR Wireless Router in dotted decimal
notation, for example, 192.168.1.1 (factory default).
IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
RIP Direction Select the RIP direction from None, Both, In Only and Out Only.
RIP Version Select the RIP version from RIP-1, RIP-2B and RIP-2M.
Multicast IGMP (Internet Group Multicast Protocol) is a session-layer protocol used to establish
membership in a multicast group. The 1500WR Wireless Router supports both IGMP
version 1 (IGMP-v-l) and IGMP-v2. Select None to disable it.
Windows Networking (NetBIOS over TCP/IP)
Allow between
LAN and WAN
Select this option to forward NetBIOS packets between the LAN port and the WAN
port.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
39
ParkerVision
Chapter 6
Wireless Conguration
This chapter discusses how to congure the Wireless screens on the 1500WR Wireless Router.
6.1 Wireless LAN Overview
This section introduces the wireless LAN(WLAN) and some basic scenarios.
6.1.1 IBSS
An Independent Basic Service Set (IBSS), also called an Ad-hoc network, is the simplest WLAN
conguration. An IBSS is dened as two or more computers with wireless adapters within range of
each other that from an independent (wireless) network without the need of an Wireless Router (AP).
6.1.2 BSS
A Basic Service Set (BSS) exists when all communications between wireless stations or between a
wireless station and a wired network client go through one Wireless Router (AP).
Intra-BSS trafc is trafc between wireless stations in the BSS. When Intra-BSS is enabled, wireless
station A and B can access the wired network and communicate with each other. When Intra-BSS is
disabled, wireless station A and B can still access the wired network but cannot communicate with
each other.
The illustration on the next page describes a BSS setup.
Horizons 1500WR Wireless 4-Port Router
40
ParkerVision
6.1.2 BSS - Continued
6.1.3 ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an
Wireless Router, with each Wireless Router connected together by a wired network.
This wired connection between APs is called a Distribution System (DS). An ESSID (ESS
IDentication) uniquely identies each ESS. All Wireless Routers and their associated wireless
stations within the same ESS must have the same ESSID in order to communicate.
Horizons 1500WR Wireless 4-Port Router
41
ParkerVision
6.2 Wireless LAN Basics
Refer also to the INSERT CHAPTER # for more background information on Wireless LAN features,
such as channels.
6.2.1 RTS/CTS
A hidden node occurs when two stations are within range of the same Wireless Router, but are not
within range of each other. The following gure illustrates a hidden node. Both stations (STA) are within
range of the Wireless Router (AP) or wireless gateway, but out-of-range of each other, so they cannot
“hear” each other, that is they do not know if the channel is currently being used. Therefore, they are
considered hidden from each other.
When station A sends data to the 1500WR Wireless Router, it might not know that station B is already
using the channel. If these two stations send data at the same time, collisions may occur when both
sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS denes the biggest
size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is
invoked.
When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station
that wants to transmit this frame must rst send an RTS (Request To Send) message to the AP for
permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations
within its range to notify them to defer their transmission. It also reserves and conrms with the
requesting station the time frame for the requested transmission.
Stations can send frames smaller than the specied RTS/CTS directly to the AP without the RTS
(Request To Send)/CTS (Clear to Send) handshake.
You should only congure RTS/CTS if the possibility of hidden nodes exists on your network and the
“cost” of resending large frames is more than the extra network overhead involved in the RTS (Request
To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS
(Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented
before they reach RTS/CTS size.
Enabling the RTS Threshold causes redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
Horizons 1500WR Wireless 4-Port Router
42
ParkerVision
6.2.2 Fragmentation Threshold
A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that
can be sent in the wireless network before the 1500WR Wireless Router will fragment the packet into
smaller data frames.
A large Fragmentation Threshold is recommended for networks not prone to interference while you
should set a smaller threshold for busy networks or networks that are prone to interference.
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set, then
the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be
fragmented before they reach RTS/CTS size.
6.3 Conguring Wireless
If you are conguring the 1500WR Wireless Router from a computer connected to the wireless LAN
and you change the 1500WR Wireless Router’s ESSID or WEP settings, you will lose your wireless
connection when you press Apply to conrm.
You must then change the wireless settings of your computer to match the 1500WR Wireless Routers
new settings.
Click ADVANCED and then WIRELESS to open the Wireless screen.
The table on the next page describes the options in this screen.
Horizons 1500WR Wireless 4-Port Router
43
ParkerVision
6.3 Conguring Wireless - Continued
The following table describes the options on the screen shown on the previous page.
LABEL DESCRIPTION
Enable Wireless
LAN
Click the check box to activate wireless LAN.
ESSID (Extended Service Set IDentity) The ESSID identies the Service Set with which a
wireless station is associated. Wireless stations associating to the Wireless Router
(AP) must have the same ESSID. Enter a descriptive name (up to 32 printable 7-bit
ASCII characters) for the wireless LAN.
If you are conguring the 1500WR Wireless Router from a
computer connected to the wireless LAN and you change
the 1500WR Wireless Routers ESSID or WEP settings, you
will lose your wireless connection when you press Apply
to conrm. You must then change the wireless settings of
your computer to match the 1500WR Wireless Routers new
settings.
Hide ESSID Select this check box to hide the ESSID in the outgoing beacon frame so a station cannot
obtain the ESSID through passive scanning using a site survey tool.
Choose
Channel ID
Set the operating frequency/channel depending on your particular region.
To manually set the 1500WR Wireless Router to use a channel, select a channel from
the drop-down list box. Click MAINTENANCE, WIRELESS and then the Channel Usage
tab to open the Channel Usage screen to make sure the channel is not already used by
another AP or independent peer-to-peer wireless network.
To have the 1500WR Wireless Router automatically select a channel, click Scan instead.
Refer to the Wizard Setup chapter for more information on channels.
Scan Click this button to have the 1500WR Wireless Router automatically scan for and select a
channel with the least interference.
RTS/CTS
Threshold
Enter a value between 0 and 2432. The default is 2432.
Fragmentation
Threshold
Enter a value between 256 and 2432. The default is 2432. It is the maximum data
fragment size that can be sent.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
See the Wireless Security INSERT CHAPTER # chapter for information on the other labels in this screen.
Horizons 1500WR Wireless 4-Port Router
44
ParkerVision
Chapter 7
Wireless Security
This Chapter describes how to use the MAC Filter, 802. lx, Local User Database and RADIUS to
congure wireless security on your 1500WR Wireless Router.
7.1 Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
stations, Wireless Routers and the wired network.
The gure below shows the possible wireless security levels on your 1500WR Wireless Router.
The highest security level relies on EAP (Extensible Authentication Protocol) for authentication and
utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote Authentication
Dial-In User Service) server either on the WAN or your LAN to provide authentication service for
wireless stations.
IMPORTANT - If you do not enable any wireless security on your 1500WR Wireless Router,
your network is accessible to any wireless networking device that is within range.
7.2 WEP Overview
WEP (Wired Equivalent Privacy) as specied in the IEEE 802.11 standard provides methods for both
data encryption and wireless station authentication.
7.2.1 Data Encryption
WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless
stations must use the same WEP key to encrypt and decrypt data. Your 1500WR Wireless Router
allows you to congure up to four 64-bit or 128-bit WEP keys, but only one key can be enabled at any
one time.
Horizons 1500WR Wireless 4-Port Router
45
ParkerVision
7.2.2 Authentication
Three different methods can be used to authenticate wireless stations to the network: Open System,
Shared Key, and Auto. The following gure illustrates the steps involved.
Open system authentication involves an unencrypted two-message procedure. A wireless station
sends an open system authentication request to the AP, which will then automatically accept and
connect the wireless station to the network. In effect, open system is not authentication at all as any
station can gain access to the network.
Shared key authentication involves a four-message procedure. A wireless station sends a shared key
authentication request to the AP, which will then reply with a challenge text message. The wireless
station must then use the AP’s default WEP key to encrypt the challenge text and return it to the AP,
which attempts to decrypt the message using the AP’s default WEP key. If the decrypted message
matches the challenge text, the wireless station is authenticated.
When your 1500WR Wireless Router’s authentication method is set to open system, it will only accept
open system authentication requests. The same is true for shared key authentication. However, when
it is set to auto authentication, the 1500WR Wireless Router will accept either type of authentication
request and the 1500WR Wireless Router will fall back to use open authentication if the shared key
does not match.
Horizons 1500WR Wireless 4-Port Router
46
ParkerVision
7.3 Conguring WEP Encryption
In order to congure and enable WEP encryption; click ADVANCED and then WIRELESS to display the
Wireless screen.
The following table describes the wireless LAN security labels in this screen.
LABEL DESCRIPTION
WEP
Encryption
Select Disable to allow wireless stations to communicate with the Wireless Routers
without any data encryption. Select 64-bit WEP or 128-bit WEP to enable data
encryption.
Authentication
Method
This eld is activated when you select 64-bit WEP or 128-bit WEP in the WEP
Encryption eld.
Select Auto, Open System or Shared Key from the drop-down list box.
ASCII Select this option in order to enter ASCII characters as the WEP keys.
Hex Select this option in order to enter hexadecimal characters as the WEP keys.
The preceding “Ox”, that identies a hexadecimal key, is entered automatically.
Key 1 to Key 4 The WEP keys are used to encrypt data. Both the 1500WR Wireless Router and the
wireless stations must use the same WEP key for data transmission.
If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters
(“0-9”, “A-F”). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters (“0-9”, “A-F”).
You must congure all four keys, but only one key can be activated at any one time. The
default key is key 1.
Continued on next page.
Horizons 1500WR Wireless 4-Port Router
47
ParkerVision
7.3 Conguring WEP Encryption - Continued
Table continued from preceeding page.
LABEL DESCRIPTION
Enable Intra-
BSS Trafc
Intra-BSS trafc is trafc between wireless stations in the BSS. Select this check box to
enable Intra-BSS Trafc.
Enable
Breathing
LED
Select this check box to enable the Breathing LED, also known as the 1500WR Wireless
Router LED.
The blue 1500WR Wireless Router LED is on when the 1500WR Wireless Router is on
and blinks (or breaths) when data is being transmitted to/from its wireless stations. Clear
the check box to turn this LED off even when the 1500WR Wireless Router is on and
data is being transmitted/received.
Number of
Wireless
Stations
Allowed
Use this eld to set a maximum number of wireless stations that may connect to the
1500WR Wireless Router.
Enter the number (from 1 to 32) of wireless stations allowed.
Output Power Set the output power of the 1500WR Wireless Router in this eld. If there is a high density
of APs within an area, decrease the output power of the 1500WR Wireless Router to
reduce interference with other APs.
The options are 11dBm (50mW), 13dBm (32mW), 15dBm (20mW) or 17dBm (12.6mW).
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
7.4 MAC Filter
The MAC lter screen allows you to congure the 1500WR Wireless Router to give exclusive access to
up to 32 devices (Allow Association) or exclude up to 32 devices from accessing the 1500WR Wireless
Router (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address.
The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for
example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to congure this
screen.
To change your 1500WR Wireless Router’s MAC lter settings, click ADVANCED, WIRELESS and
then the MAC Filter tab.
The screen appears as shown on the next page.
Horizons 1500WR Wireless 4-Port Router
48
ParkerVision
7.4 MAC Filter - Continued
MAC Filter Conguration Screen:
The following table describes the labels in this menu.
LABEL DESCRIPTION
Active Select Yes from the drop down list box to enable MAC address ltering.
Filter Action Dene the lter action for the list of MAC addresses in the MAC Address table.
Select Deny Association to block access to the 1500WR Wireless Router, MAC addresses not listed will be
allowed to access the 1500WR Wireless Router
Select Allow Association to permit access to the 1500WR Wireless Router, MAC addresses not listed will
be denied access to the 1500WR Wireless Router.
MAC
Address
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station that are allowed or
denied access to the 1500WR Wireless Router in these address elds.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
49
ParkerVision
7.5 802.1 x Overview
The IEEE 802. lx standard outlines enhanced security methods for both the authentication of wireless
stations and encryption key management. Authentication can be done using the local user database
internal to the 1500WR Wireless Router (authenticate up to 32 users) or an external RADIUS server for
an unlimited number of users.
7.6 Introduction to RADIUS
RADIUS is based on a client-sever model that supports authentication and accounting, where Wireless
Router is the client and the server is the RADIUS server. The RADIUS server handles the following
tasks among others:
Authentication - Determines the identity of the users.
Accounting - Keeps track of the client’s network activity.
RADIUS user is a simple package exchange in which your 1500WR Wireless Router acts as a message
relay between the wireless station and the network RADIUS server.
Types of RADIUS Messages
The following types of RADIUS messages are exchanged between the Wireless Router and the
RADIUS server for user authentication:
Access-Request - Sent by an Wireless Router requesting authentication.
Access-Reject - Sent by a RADIUS server rejecting access.
Access-Accept - Sent by a RADIUS server allowing access.
Access-Challenge - Sent by a RADIUS server requesting more information in order to allow access.
The Wireless Router sends a proper response from the user and then sends another Access-
Request message.
The following types of RADIUS messages are exchanged between the Wireless Router and the
RADIUS server for user accounting:
Accounting-Request - Sent by the Wireless Router requesting accounting.
Accounting-Response - Sent by the RADIUS server to indicate that it has started or stopped
accounting.
In order to ensure network security, the Wireless Router and the RADIUS server use a shared secret
key, which is a password, they both know. The key is not sent over the network. In addition to the shared
key, password information exchanged is also encrypted to protect the wired network from unauthorized
access.
7.6.1 EAP Authentication Overview
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1x transport mechanism in order to support multiple types of user authentication. By using
EAP to interact with an EAP-compatible RADIUS server, the Wireless Router helps a wireless station
and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server or the AP. The 1500WR
Wireless Router supports EAP-TLS, EAP-TTLS and DEAP with RADIUS. Refer to the Types of EAP
Authentication appendix for descriptions on the four common types.
Your 1500WR Wireless Router supports EAP-MD5 (Message-Digest Algorithm 5) with the local user
database and RADIUS. The following gure shows an overview of authentication when you specify a
RADIUS server on your Wireless Router.
Horizons 1500WR Wireless 4-Port Router
50
ParkerVision
7.6.1 EAP Authentication Overview - Continued
The details below provide a general description of how IEEE 802. lx EAP authentication works. For an
example list of EAP-MD5 authentication steps, see the IEEE 802.lx appendix.
• The wireless station sends a “start” message to the 1500WR Wireless Router.
• The 1500WR Wireless Router sends a “request identity” message to the wireless station for identity
information.
• The wireless station replies with identity information, including username and password.
• The RADIUS server checks the user information against its user prole database and determines
whether or not to authenticate the wireless station.
7.7 Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when the
wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated
each time reauthentication is performed.
If this feature is enabled, it is not necessary to congure a default encryption key in the Wireless
screen. You may still congure and store keys here, but they will not be used while Dynamic WEP is
enabled.
To use Dynamic WEP, enable and congure the RADIUS server (see section 7.11) and enable
Dynamic WEP Key Exchange in the 802.lx screen. Ensure that the wireless station’s EAP type is
congured to one of the following:
EAP-TLS
• EAP-TTLS
• PEAP
EAP-MD5 cannot be used with Dynamic WEP Key Exchange.
Horizons 1500WR Wireless 4-Port Router
51
ParkerVision
7.8 Introduction to Local User Database
By storing user proles locally on the 1500WR Wireless Router, your 1500WR Wireless Router is able
to authenticate wireless users without interacting with a network RADIUS server. However, there is a
limit on the number of users you may authenticate in this way.
7.9 Conguring 802.1 x
To change your 1500WR Wireless Router’s authentication settings, click ADVANCED, WIRELESS and
then the 802.1x tab. The screen appears as shown below.
The following table describes the settings on this screen.
LABEL DESCRIPTION
Wireless Port
Control
To control wireless stations access to the wired network, select a control method from the drop-down list
box. Choose from No Authentication Required, Authentication Required and No Access Allowed.
No Authentication Required allows all wireless stations access to the wired network without entering
usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter usernames and passwords
before access to the wired network is allowed.
No Access Allowed blocks all wireless stations access to the wired network.
ReAuthentication
Timer
(in seconds)
Specify how often wireless stations have to reenter usernames and passwords in order to stay
connected. This eld is activated only when you select Authentication Required in the Wireless Port
Control eld.
Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30
minutes).
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The 1500WR Wireless Router automatically disconnects a wireless station from the wired network
after a period of inactivity. The wireless station needs to enter the username and password again before
access to the wired network is allowed.
This eld is activated only when you select Authentication Required in the Wireless Port Control
eld. The default time interval is 3600 seconds (or 1 hour).
Table continued on next page.
Horizons 1500WR Wireless 4-Port Router
52
ParkerVision
7.9 Conguring 802.1 x - Continued
LABEL DESCRIPTION
Authentication
Databases
This eld is activated only when you select Authentication Required in the Wireless Port Control
eld.
The authentication database contains wireless station login information. The local user database
is the built-in database on the 1500WR Wireless Router. The RADIUS is an external server. Use
this drop-down list box to select which database the 1500WR Wireless Router should use (rst) to
authenticate a wireless station.
Before you specify the priority, make sure you have set up the corresponding database correctly
rst.
Select Local User Database Only to have the 1500WR Wireless Router just check the built-in user
database on the 1500WR Wireless Router for a wireless station’s username and password.
Select RADIUS Only to have the 1500WR Wireless Router just check the user database on the
specied RADIUS server for a wireless station’s username and password.
Select Local rst, then RADIUS to have the 1500WR Wireless Router rst check the user
database on the 1500WR Wireless Router for a wireless station’s username and password. If
the user name is not found, the 1500WR Wireless Router then checks the user database on the
specied RADIUS server.
Select RADIUS rst, then Local to have the 1500WR Wireless Router rst check the user
database on the specied RADIUS server for a wireless station’s username and password. If the
1500WR Wireless Router cannot reach the RADIUS server, the 1500WR Wireless Router then
checks the local user database on the 1500WR Wireless Router. When the user name is not found
or password does not match in the RADIUS server, the 1500WR Wireless Router will not check the
local user database and the authentication fails.
Dynamic WEP
Key Exchange
This eld is activated only when you select Authentication Required in the Wireless Port Control
eld. Also set the Authentication Databases eld to RADIUS Only. Local user database may not
be used.
Select Disable to allow wireless stations to communicate with the Wireless Routers without using
dynamic WEP key exchange.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Up to 32 stations can access the 1500WR Wireless Router when you congure dynamic WEP key
exchange.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
Once you enable user authentication, you need to specify an external RADIUS server or
create local user accounts on the 1500WR Wireless Router for authentication.
Horizons 1500WR Wireless 4-Port Router
53
ParkerVision
7.10 Conguring Local User Database
To change your 1500WR Wireless Router’s local user database, click ADVANCED, WIRELESS and
then the Local User Database tab. The screen appears as shown (some of the screen’s blank rows
are not shown).
The descriptions for the settings in this screen are described on the next page.
Horizons 1500WR Wireless 4-Port Router
54
ParkerVision
7.10 Conguring Local User Database - Continued
The following table describes the labels in the screen shown on the preceeding page.
LABEL DESCRIPTION
Active Select this option to activate the user prole.
User Name Enter the username (up to 31 characters) for this user prole.
Password Type a password (up to 31 characters) for this user prole. Note that as you type a
password, the screen displays a (*) for each character you type.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
7.11 Conguring RADIUS
Use RADIUS if you want to authenticate wireless users using an external server.
To specify a RADIUS server, click ADVANCED, WIRELESS and then the RADIUS tab. The screen appears
as shown below.
The descriptions for the labels in the screen above are shown on the next page.
Horizons 1500WR Wireless 4-Port Router
55
ParkerVision
7.11 Conguring RADIUS - Continued
The following table describes the labels in this screen on the preceeding page.
LABEL DESCRIPTION
Authentication Server
Active Select Yes from the drop down list box to enable user authentication through an
external authentication server.
Server IP Address Enter the IP address of the external authentication server in dotted decimal
notation.
Port Number Enter the port number of the external authentication server. The default port number
is 1812. You need not change this value unless your network administrator instructs
you to do so with additional information.
Shared Secret Enter a password (up to 31 alphanumeric characters) as the key to be shared
between the external authentication server and the 1500WR Wireless Router.
The key must be the same on the external authentication server and your 1500WR
Wireless Router. The key is not sent over the network.
Accounting Server
Active Select Yes from the drop down list box to enable user accounting through an
external authentication server.
Server IP Address Enter the IP address of the external accounting server in dotted decimal notation.
Port Number Enter the port number of the external accounting server. The default port number is
1813. You need not change this value unless your network administrator instructs you
to do so with additional information.
Shared Secret Enter a password (up to 31 alphanumeric characters) as the key to be shared
between the external accounting server and the 1500WR Wireless Router.
The key must be the same on the external accounting server and your 1500WR
Wireless Router. The key is not sent over the network.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to reload the previous conguration for this screen.
Horizons 1500WR Wireless 4-Port Router
56
ParkerVision
This part discusses Wide Area Network (WAN) Setup Screens
Part III
WAN’s - Wide Area Networks
Horizons 1500WR Wireless 4-Port Router
57
ParkerVision
Chapter 8
WAN Conguration Screens
This chapter describes how to congure the 1500WR Wireless Router WAN screens.
8.1 WAN Overview
A WAN (Wide Area Network) is an outside connection to another network or the Internet.
See the Wizard Setup chapter for more background information on most elds in the WAN screens.
Background information on WAN elds not included in the Wizard is described here.
8.2 Conguring WAN ISP
To change your 1500WR Wireless Router’s WAN ISP settings, click ADVANCED, WAN and then the
ISP tab. The screen differs by the encapsulation.
8.2.1 Ethernet Encapsulation
The screen shown next is for Ethernet encapsulation.
The descriptions for the labels in the screen above are shown on the next page.
Horizons 1500WR Wireless 4-Port Router
58
ParkerVision
8.2.1 Ethernet Encapsulation - Continued
The following table descirbes the labels on the screen on the preceeding page.
Ethernet Encapsulation
LABEL
DESCRIPTION
Encapsulation You must choose the Ethernet option when the WAN port is used as a regular
Ethernet.
Service Type Select from Standard, RR-Toshiba (RoadRunner Toshiba authentication method),
RR-Manager (Roadrunner Manager authentication method), RR-Telstra or Telia
Login. Choose a Roadrunner service type if your ISP is Time Warner’s Roadrunner;
otherwise choose Standard.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Service Type
The screen varies according to the service type you select. You need a username and password if
your ISP is Time Warners Roadrunner.
The descriptions for the labels in the screen above are shown on the next page.
Horizons 1500WR Wireless 4-Port Router
59
ParkerVision
8.2.1 Ethernet Encapsulation Service Type - Continued
The following table descirbes the labels on the screen on the preceeding page.
LABEL
DESCRIPTION
Encapsulation You must choose the Ethernet option when the WAN port is used as a regular
Ethernet.
Service Type Select from Standard, RR-Toshiba (RoadRunner Toshiba authentication method),
RR-Manager (Roadrunner Manager authentication method) RR-Telstra or Telia
Login. Choose a Roadrunner service type if your ISP is Time Warner’s Roadrunner;
otherwise choose Standard.
User Name Enter the username given to you by your ISP.
Password Enter the password associated with the login name above.
Retype to
Conrm
Type your password again here to ensure that what you entered in the Password
eld above was what you intended.
Login Server IP
Address
The 1500WR Wireless Router will nd the Roadrunner Server IP address if this
eld is left blank. If it does not, then you must enter the authentication server IP
address.
Login Server (Telia
Login only)
Type the domain name of the Telia login server, for example “logini .telia.com”.
This eld is not available on all models.
Relogin Every(min)
(Telia Login only)
The Telia server logs the 1500WR Wireless Router out if the 1500WR Wireless
Router does not log in periodically. Type the number of minutes from 1 to 59 (30
recommended) for the 1500WR Wireless Router to wait between logins.
This eld is not available on all models.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
8.2.2 PPPoE Encapsulation
PPPoE (Point-to-Point Protocol over Ethernet) is an IETF Draft standard (RFC 2516) specifying how
a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection.
The PPP over Ethernet option is for a dial-up connection using PPPoE.
The screen shown on the next page is for PPP over Ethernet encapsulation.
Horizons 1500WR Wireless 4-Port Router
60
ParkerVision
8.2.2 PPPoE Encapsulation - Continued
The following table describes the labels in this screen.
LABEL
DESCRIPTION
ISP Parameters for Internet Access
Encapsulation The PPP over Ethernet choice is for a dial-up connection using PPPoE. The 1500WR
Wireless Router supports PPPoE (Point-to-Point Protocol over Ethernet).
Service Name Type the PPPoE service name provided to you. PPPoE uses a service name to
identify and reach the PPPoE server.
User Name Type the username given to you by your ISP.
Password Type the password associated with the user name above.
Retype to Conrm Type your password again here to ensure that what you entered in the Password
eld above was what you intended.
Nailed Up
Connection
Select Nailed Up Connection if you do not want the connection to time out.
Idle Timeout Specify the time in seconds that elapses before the 1500WR Wireless
Router automatically disconnects from the PPPoE server.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
61
ParkerVision
8.2.3 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data
from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based
networks.
PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as
the Internet.
The screen shown below is for PPTP encapsulation.
The descriptions for the labels in the screen above are shown on the next page.
Horizons 1500WR Wireless 4-Port Router
62
ParkerVision
8.2.3 PPTP Encapsulation - Continued
The following table descirbes the labels on the screen on the preceeding page.
LABEL
DESCRIPTION
ISP Parameters for Internet Access
Encapsulation PPTP supports on-demand, multi-protocol, and virtual private networking over
public networks, such as the Internet. The 1500WR Wireless Router supports only
one PPTP server connection at any given time. To congure a PPTP client, you
must congure the My Login and Password elds for a PPP connection and the
PPTP parameters for a PPTP connection.
User Name Type the user name given to you by your ISP.
Password Type the password associated with the user name above.
Retype to Conrm Type your password again here to ensure that what you entered in the Password
eld above was what you intended.
Nailed-up
Connection
Select Nailed Up Connection if you do not want the connection to time out.
Idle Timeout Specify the time in seconds that elapses before the 1500WR Wireless
Router automatically disconnects from the PPTP server.
PPTP Conguration
My IP Address Type the (static) IP address assigned to you by your ISP.
My IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
Server IP Address Type the IP address of the PPTP server.
Connection ID/Name Type your identication name for the PPTP server.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
8.3 TCP/IP Priority (Metric)
The metric represents the “cost of transmission”. A router determines the best route for transmission by
choosing a path with the lowest “cost”. RIP routing uses hop count as the measurement of cost, with a
minimum of “ 1” for directly connected networks. The number must be between “ 1” and “ 15”; a number
greater than “15” means the link is down. The smaller the number, the lower the “cost”.
The metric sets the priority for the 1500WR Wireless Router’s routes to the Internet, if any two of the
default routes have the same metric.
Horizons 1500WR Wireless 4-Port Router
63
ParkerVision
8.4 Conguring WAN IP
To change your 1500WR Wireless Router’s WAN IP settings, click ADVANCED, WAN and then the IP
tab.
The table on the following page describes the labels in this screen.
LABEL DESCRIPTION
WAN IP Address Assignment
Get automatically from ISP option Select this selection if your ISP did not assign you a xed IP address.
This is the default
Horizons 1500WR Wireless 4-Port Router
64
ParkerVision
8.4 Conguring WAN IP - Continued
The following table descirbes the labels on the screen on the preceeding page.
LABEL DESCRIPTION
WAN IP Address Assignment
Get automatically from ISP
option
Select this selection if your ISP did not assign you a xed IP address. This is the
default
Use xed IP address Select this option If the ISP assigned a xed IP address.
My WAN IP Address Enter the 1500WR Wireless Router WAN IP address in this eld if you selected Use
Fixed IP Address.
My WAN IP Subnet Mask
(Ethernet encapsulation)
Enter the 1500WR Wireless Router WAN IP subnet mask (if your ISP gave you
one) in this eld if you selected Use Fixed IP Address.
Remote IP Address (or
Gateway IP Address)
Type the IP address of the remote network or gateway. The gateway is an
immediate neighbor of your 1500WR Wireless Router that will forward the packet
to the destination. On the LAN, the gateway must be a router on the same
segment as your 1500WR Wireless Router; over the WAN, the gateway must be
the IP address of one of the remote nodes.
Remote IP Subnet Mask (PPPoE
and PPTP encapsulation)
When using a LAN to LAN application, type the IP subnet mask of the
destination network. If you need to specify a route to a single host, use a
subnet mask of 255.255.255.255, in the subnet mask eld, to force the
network number to be identical to the host ID.
Network Address Translation Network Address Translation (NAT) allows the translation of an Internet protocol
address used within one network to a different IP address known within another
network.
SUA (Single User Account) is a subset of NAT that supports two types of
mapping: Many-to-One and Server. When you select this option the 1500WR
Wireless Router will use Address Mapping Set 255 in the SMT.
Choose SUA Only if you have just one public WAN IP address for your 1500WR
Wireless Router. Choose Full Feature if you have multiple public WAN IP
addresses for your 1500WR Wireless Router. For more information about NAT
refer to the MAT chapter in this User’s Guide.
Metric (PPPoE and PPTP only) Type a number that approximates the cost for this link. Metric represents the “cost”
of transmission for routing purposes. IP routing uses hop count as the measurement
of cost, with a minimum of 1 for directly connected networks. The number need not
be precise, but it must be between 1 and 15. In practice, 2 or 3 is usually a good
number.
Private (PPPoE and PPTP
only)
This parameter determines if the 1500WR Wireless Router will include the route
to this remote node in its RIP broadcasts. If select Yes, this route is kept private
and not included in RIP broadcast. If select No, the route to this remote node will
be propagated to other hosts through RIP broadcasts.
Continued Next Page
Horizons 1500WR Wireless 4-Port Router
65
ParkerVision
8.4 Conguring WAN IP - Continued
The following table descirbes the labels on the screen on the preceeding pages.
LABEL DESCRIPTION
RIP Direction RIP (Routing Information Protocol) allows a router to exchange routing information with other
routers. The RIP Direction eld controls the sending and receiving of RIP packets.
Choose Both, None, In Only or Out Only. When set to Both or Out Only, the 1500WR Wireless
Router will broadcast its routing table periodically.
When set to Both or In Only, the 1500WR Wireless Router will incorporate RIP information that it
receives.
When set to None, the 1500WR Wireless Router will not send any RIP packets and will ignore any
RIP packets received.
By default, RIP Direction is set to Both.
RIP Version The RIP Version eld controls the format and the broadcasting method of the RIP packets that the
1500WR Wireless Router sends (it recognizes both formats when receiving).
Choose RIP-1, RIP-2B or RIP-2M.
RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for
most networks, unless you have an unusual network topology. Both RIP-2B and RIP-2M sends the
routing data in RIP-2 format; the difference being that RIP-2B uses subnet broadcasting while RIP-
2M uses multicasting. Multicasting can reduce the load on non-router machines since they generally
do not listen to the RIP multicast address and so will not receive the RIP packets. However, if one
router uses multicasting, then all routers on your network must use multicasting, also. By default,
the RIP Version eld is set to RIP-1.
Multicast Choose None (default), IGMP-V1 or IGMP-V2. IGMP (Internet Group Multicast Protocol) is a
session-layer protocol used to establish membership in a Multicast group - it is not used to carry
user data. IGMP version 2 (RFC 2236) is an improvement over version 1 (RFC 1112) but IGMP
version 1 is still in wide use. If you would like to read more detailed information about interoperability
between IGMP version 2 and version 1, please see sections 4 and 5 of RFC 2236.
Windows Networking (NetBIOS over TCP/IP): NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast
packets that enable a computer to connect to and communicate with a LAN. For some dial-up services such as PPPoE or
PPTP, NetBIOS packets cause unwanted calls.
Allow From WAN
to LAN
Select this option to forward NetBIOS packets from the WAN port to the LAN port.
Allow Trigger Dial Select this option to allow NetBIOS packets to initiate calls.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
66
ParkerVision
8.5 Conguring WAN MAC
To change your 1500WR Wireless Router’s WAN MAC settings, click ADVANCED, WAN and then the
MAC tab. The screen appears as shown.
The MAC address screen allows users to congure the WAN port’s MAC address by either using the
factory default or cloning the MAC address from a computer on your LAN.
Choose Factory Default to select the factory assigned default MAC address.
Horizons 1500WR Wireless 4-Port Router
67
ParkerVision
This part covers the information about SUA/NAT and Static Route setup.
Part IV
SUA (Single User Account)/
NAT (Network Address
Translation) and STATIC ROUTE
Horizons 1500WR Wireless 4-Port Router
68
ParkerVision
Chapter 9
Single User Account (SUA) / Network Address Translation (NAT)
This chapter discusses how to congure SUA/NAT on the 1500WR Wireless Router.
9.1 NAT Overview
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a
packet. For example, the source address of an outgoing packet, used within one network is changed
to a different IP address known within another network.
9.1.1 NAT Denitions
Inside/outside denotes where a host is located relative to the 1500WR Wireless Router For example,
the computers of your subscribers are the inside hosts, while the web servers on the Internet are the
outside hosts.
Global/local denotes the IP address of a host in a packet as the packet traverses a router. For
example, the local address refers to the IP address of a host when the packet is in the local network,
while the global address refers to the IP address of the host when the same packet is traveling in the
WAN side.
Note that inside/outside refers to the location of a host, while global/local refers to the IP address
of a host used in a packet. Thus, an inside local address (ILA) is the IP address of an inside host in
a packet when the packet is still in the local network, while an inside global address (IGA) is the IP
address of the same inside host when the packet is on the WAN side.
The following table summarizes this information.
TERM DESCRIPTION
Inside This refers to the host on the LAN.
Outside This refers to the host on the WAN.
Local This refers to the packet address (source or destination) as the packet travels on the LAN.
Global This refers to the packet address (source or destination) as the packet travels on the WAN.
NAT never changes the IP address (either local or global) of an outside host.
Horizons 1500WR Wireless 4-Port Router
69
ParkerVision
9.1 NAT Overview - Continued
9.1.2 What NAT Does
In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the
inside local address) to another (the inside global address) before forwarding the packet to the WAN
side. When the response comes back, NAT translates the destination address (the inside global ad-
dress) back to the inside local address before forwarding it to the original inside host. Note that the IP
address (either local or global) of an outside host is never changed.
The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP.
In addition, you can designate servers (for example a web server and a telnet server) on your local
network and make them accessible to the outside world. Although you can make designated servers
on the LAN accessible to the outside world, it is strongly recommended that you attach those servers
to the DMZ port instead. If you do not dene any servers (for Many-to-One and Many-to-Many Over-
load mapping), NAT offers the additional benet of rewall protection. With no servers dened, your
1500WR Wireless Router lters out all incoming inquiries, thus preventing intruders from probing your
network. For more information on IP address translation, refer to RFC 1631, The IP Network Address
Translator (NAT).
9.1.3 How NAT Works
Each packet has two addresses - a source address and a destination address. For outgoing packets,
the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address)
is the source address on the WAN. For incoming packets, the ILA is the destination address on the
LAN, and the IGA is the destination address on the WAN. NAT maps private (local) IP addresses to
globally unique ones required for communication with hosts on other networks. It replaces the original
IP source address (and TCP or UDP source port numbers for Many-to-One and Many-to-Many Over-
load NAT mapping) in each packet and then forwards it to the Internet. The 1500WR Wireless Router
keeps track of the original addresses and port numbers so incoming reply packets can have their origi-
nal values restored.
The following gure illustrates this.
Horizons 1500WR Wireless 4-Port Router
70
ParkerVision
9.1 NAT Overview - Continued
9.1.4 NAT Application
The following gure illustrates a possible NAT application, where three inside LANs (logical LANs us-
ing IP Alias) behind the 1500WR Wireless Router can communicate with three distinct WAN networks.
More examples follow at the end of this chapter.
Horizons 1500WR Wireless 4-Port Router
71
ParkerVision
9.1 NAT Overview - Continued
9.1.5 NAT Mapping Types
NAT supports ve types of IP/port mapping. They are:
> One to One: In One-to-One mode, the 1500WR Wireless Router maps one local IP address to one
global IP address.
> Many to One: In Many-to-One mode, the 1500WR Wireless Router maps multiple local IP address-
es to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ParkerVi-
sion’s Single User Account feature (the SUA Only option).
> Many to Many Overload: In Many-to-Many Overload mode, the 1500WR Wireless Router maps the
multiple local IP addresses to shared global IP addresses.
> Many One to One: In Many-One-to-One mode, the 1500WR Wireless Router maps each local IP
address to a unique global IP address.
> Server: This type allows you to specify inside servers of different services behind the NAT to be
accessible to the outside world.
Port numbers do not change for One-to-One and Many-One-to-One NAT mapping types.
The following table summarizes these types.
TYPE IP MAPPING SMT ABBREVIATION
One-to-One ILA1 < > IGA1 1-1
Many-to-One (SUA/PAT) ILA1 < > IGA1
ILA2 < > IGA1
M-1
Many-to-Many Overload ILA1 < > IGA1
ILA2 < > IGA2
ILA3 < > IGA1
ILA4 < > IGA2
M-MOv
Many-One-to-One ILA1 < > IGA1
ILA2< > IGA2
ILA3< > IGA3
M-1-1
Server Server 1 IP< > IGA1
Server 2 IP< > IGA1
Server 3 IP< > IGA1
Server
Horizons 1500WR Wireless 4-Port Router
72
ParkerVision
9.1 NAT Overview - Continued
9.1.6 SUA (Single User Account) Versus NAT
SUA (Single User Account) is a ParkerVision implementation of a subset of NAT that supports two
types of mapping, Many-to-One and Server. The 1500WR Wireless Router also supports Full Feature
NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers us-
ing mapping types. Select either SUA Only or Full Feature in WAN IP.
9.2 SUA Server
An SUA server set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that
you can make visible to the outside world even though SUA makes your whole inside network appear
as a single computer to the outside world.
You may enter a single port number or a range of port numbers to be forwarded, and the local IP ad-
dress of the desired server. The port number identies a service; for example, web service is on port
80 and FTP on port 21. In some cases, such as for unknown services or where one server can support
more than one service (for example both FTP and web service), it might be better to specify a range of
port numbers. You can allocate a server IP address that corresponds to a port or a range of ports.
Many residential broadband ISP accounts do not allow you to run any server processes (such as a
Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend
your account if it discovers any active services at your location. If you are unsure, refer to your ISP.
Default Server IP Address
In addition to the servers for specied services, NAT supports a default server IP address. A default
server receives packets from ports that are not specied in this screen.
If you do not assign a Default Server IP Address, then all packets received for ports
not specied in this screen will be discarded.
9.2.1 Port Forwarding: Services and Port Numbers
In addition to the servers for specied services, NAT supports a default server. A service request that
does not have a server explicitly designated for it is forwarded to the default server. If the default server
is not dened, the service request is simply discarded.
Many residential broadband ISP accounts do not allow you to run any server
processes (such as a Web or FTP server) from your location. Your ISP may
periodically check for servers and may suspend your account if it discovers any
active services at your location. If you are unsure, refer to your ISP.
The most often used port numbers are shown in the table on the following page.
Horizons 1500WR Wireless 4-Port Router
73
ParkerVision
9.2.1 Port Forwarding: Services and Port Numbers - Continued
Services and Port Numbers
SERVICES PORT NUMBER
ECHO 7
FTP (File Transfer Protocol) 21
SMTP (Simple Mail Transfer Protocol) 25
DNS (Domain Name System) 53
Finger 79
HTTP (Hyper Text Transfer protocol or WWW, Web) 80
P0P3 (Post Ofce Protocol) 110
NNTP (Network News Transport Protocol) 119
SNMP (Simple Network Management Protocol) 161
SNMP trap 162
PPTP (Point-to-Point Tunneling Protocol) 1723
9.2.2 Conguring Servers Behind SUA (Example)
Let’s say you want to assign ports 22-25 to one server, port 80 to another and assign a default server
IP address of 192.168.1.35 as shown in the gure below.
The NAT network appears as a single host on the Internet
Horizons 1500WR Wireless 4-Port Router
74
ParkerVision
9.3 Conguring SUA Server
If you do not assign a Default Server IP address, then all packets received for ports
not specied in this screen will be discarded.
Click ADVANCED and then SU A/NAT to open the SUA Server screen. Refer to the table in the
previous section for port numbers commonly used for particular services.
The table below describes the settings in this screen.
LABEL DESCRIPTION
Default Server In addition to the servers for specied services, NAT supports a default server. A default
server receives packets from ports that are not specied in this screen. If you do not
assign a default server IP address, then all packets received for ports not specied in this
screen will be discarded.
# This eld displays the number of an individual SUA server entry.
Active Select this check box to enable the SUA server entry. Clear this checkbox to disallow
forwarding of these ports to an inside server without having to delete the entry.
Name Enter a name to identify this port-forwarding rule.
Start Port
End Port
Enter a port number here.
To forward only one port, enter the port number in the Start Port eld and then type it
again in the End Port eld.
To specify a range of ports, enter the start port number in the Start Port eld and the
last port to be forwarded in the End Port eld.
Server IP
Address
Enter the inside IP address of the server here.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
75
ParkerVision
9.4 Conguring Address Mapping
Ordering your rules is important because the 1500WR Wireless Router applies the rules in the order
that you specify. When a rule matches the current packet, the 1500WR Wireless Router takes the cor-
responding action and the remaining rules are ignored. If there are any empty rules before your new
congured rule, your congured rule will be pushed up by that number of empty rules. For example, if
you have already congured rules 1 to 6 in your current set and now you congure rule number 9. In
the set summary screen, the new rule will be rule 7, not 9. Now if you delete rule 4, rules 5 to 7 will be
pushed up by 1 rule, so old rules 5,6 and 7 become new rules 4, 5 and 6.
To change your 1500WR Wireless Router’s address mapping settings, click ADVANCED, SUA/NAT
and then the Address Mapping tab. The screen appears as shown.
The table below describes the setting in the above screen.
LABEL DESCRIPTION
# This eld displays the index number of the address mapping rule.
Local Start IP This refers to the Inside Local Address (ILA), that is the starting local IP address. Local IP
addresses are N/A for Server port mapping.
Local End IP This is the end local IP address. If the rule is for all local IP addresses, then this eld
displays 0.0.0.0 and 255.255.255.255 as the Local End IP address. This eld is N/A for
One-to-One and Server mapping types.
Global Start IP This refers to the global IP address. 0.0.0.0 is for a dynamic IP address from your ISP
with Many-to-One and Server mapping types.
Global End IP This is the ending Inside Global Address (IGA), that is the starting global IP address.
This eld is N/A for One-to-One, Many-to-One and Server mapping types.
Type Choose the port mapping type from the drop down list.
Insert Click Insert to insert a new mapping rule before an existing one.
Edit Click Edit to go to the Address Mapping Rule screen.
Delete Click Delete to delete an address mapping rule.
Horizons 1500WR Wireless 4-Port Router
76
ParkerVision
9.4.1 Conguring Address Mapping Rule
To edit an address mapping rule, click the Edit button to display the screen shown next.
The following table describes the labels in this screen.
LABEL DESCRIPTION
Type Choose the port mapping type from the drop down list.
Local Start IP This is the starting local IP address (ILA). Local IP addresses are N/A for Server port
mapping.
Local End IP This is the end local IP address (ILA). If your rule is for all local IP addresses, then
enter 0.0.0.0 as the Local Start IP address and 255.255.255.255 as the Local End
IP address.
This eld is N/A for One-to-One and Server mapping types.
Global Start IP This is the starting global IP address (IGA). Enter 0.0.0.0 here if you have a dynamic IP
address from your ISP.
Global End IP This is the ending global IP address (IGA). This eld is N/A for One-to-One, Many-to-
One and Server mapping types.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Cancel Click Cancel to exit this screen without saving.
Horizons 1500WR Wireless 4-Port Router
77
ParkerVision
Chapter 10
Static Route
This chapter shows you how to congure static routes for your 1500WR Wireless Router.
10.1 Static Route Overview
Each remote node species only the network to which the gateway is directly connected, and the
1500WR Wireless Router has no knowledge of the networks beyond. For instance, the 1500WR
Wireless Router knows about network N2 in the following gure through remote node Router 1.
However, the 1500WR Wireless Router is unable to route a packet to network N3 because it doesn’t
know that there is a route through the same remote node Router 1 (via gateway Router 2). The static
routes are for you to tell the 1500WR Wireless Router about the networks beyond the remote nodes.
10.2 Conguring IP Static Route
Click ADVANCED and then STATIC ROUTE to open the screen shown next.
Horizons 1500WR Wireless 4-Port Router
78
ParkerVision
10.2 Conguring IP Static Route
Click ADVANCED and then STATIC ROUTE to open the screen shown next.
The following table describes the labels in this screen.
IP Static Route Summary
LABEL DESCRIPTION
# This eld displays an individual static route index number.
Name This eld displays the name that describes or identies this route.
Active This eld shows whether this static route is active (Yes) or not (No).
Destination This parameter species the IP network address of the nal destination. Routing is
always based on network number.
Gateway This eld displays the IP address of the gateway. The gateway is an immediate
neighbor of your 1500WR Wireless Router that will forward the packet to the destination.
On the LAN, the gateway must be a router on the same segment as your 1500WR
Wireless Router; over the WAN, the gateway must be the IP address of one of the
remote nodes.
Edit To set up a static route on the 1500WR Wireless Router, click the radio button next
to the static route index number you want to congure, then click Edit to go to the
Static Route -Edit screen.
Delete To remove a static route on the 1500WR Wireless Router, click the radio button next to the
static route index number you want to remove, then click Delete.
Horizons 1500WR Wireless 4-Port Router
79
ParkerVision
10.2.1 Conguring Route Entry
Select a static route index number and click Edit. The screen shown next appears. Fill in the required
information for each static route.
The following table describes the labels in this screen.
Edit IP Static Route
LABEL DESCRIPTION
Route Name Enter a descriptive name for this route. This is for identication purposes only.
Active Select this check box to activate this static route.
Destination IP
Address
Type the IP network address of the nal destination. Routing is always based on network number.
If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet
mask eld to force the network number to be identical to the host ID.
IP Subnet Mask Type the IP subnet mask here.
Gateway IP
Address
Type the IP address of the gateway. The gateway is an immediate neighbor of your 1500WR Wireless
Router that will forward the packet to the destination. On the LAN, the gateway must be a router on
the same segment as your 1500WR Wireless Router; over the WAN, the gateway must be the IP
address of one of the remote nodes.
Metric Type a number that approximates the cost for this link. Metric represents the “cost” of transmission
for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1
for directly connected networks. The number need not be precise, but it must be between 1 and 15.
In practice, 2 or 3 is usually a good number.
Private This parameter determines if the 1500WR Wireless Router will include the route to this remote node
in its RIP broadcasts. If this check box is selected, this route is kept private and not included in
RIP broadcast. If it is not selected, the route to this remote node will be propagated to other hosts
through RIP broadcasts.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Cancel Click Cancel to exit this screen without saving.
Horizons 1500WR Wireless 4-Port Router
80
ParkerVision
This part introduces rewalls in general and the 1500WR Wireless Router rewall.
It also explains custom ports and gives example rewall rules and
information on Remote Management.
Part V
Firewall and Remote Management
Horizons 1500WR Wireless 4-Port Router
81
ParkerVision
Chapter 11
Introduction to Firewalls
This chapter gives some background information on rewalls and introduces the 1500WR Wireless
Router rewall.
11.1 Firewall Overview
Originally, the term Firewall referred to a construction technique designed to prevent the spread of
re from one room to another. The networking term “rewall” is a system or group of systems that
enforces an access-control policy between two networks. It may also be dened as a mechanism
used to protect a trusted network from an untrusted network. Of course, rewalls cannot solve every
security problem. A rewall is one of the mechanisms used to establish a network security perimeter in
support of a network security policy. It should never be the only mechanism or method employed. For
a rewall to guard effectively, you must design and deploy it appropriately. This requires integrating
the rewall into a broad information-security policy. In addition, specic policies must be implemented
within the rewall itself.
11.2 Types of Firewalls
There are three main types of rewalls:
1. Packet Filtering Firewalls
2. Application-level Firewalls
3. Stateful Inspection Firewalls
11.2.1 Packet Filtering Firewalls
Packet ltering rewalls restrict access based on the source/destination computer network address
of a packet and the type of application.
11.2.2 Application-level Firewalls
Application-level rewalls restrict access by serving as proxies for external servers. Since they use
programs written for specic Internet services, such as HTTP, FTP and telnet, they can evaluate
network packets for valid application-specic data. Application-level gateways have a number of
general advantages over the default mode of permitting application trafc directly to internal hosts:
i. Information hiding prevents the names of internal systems from being made known via DNS to
outside systems, since the application gateway is the only host whose name must be made known to
outside systems.
ii. Robust authentication and logging pre-authenticates application trafc before it reaches internal
hosts and causes it to be logged more effectively than if it were logged with standard host logging.
Filtering rules at the packet ltering router can be less complex than they would be if the router needed
to lter application trafc and direct it to a number of specic systems. The router need only allow
application trafc destined for the application gateway and reject the rest.
Horizons 1500WR Wireless 4-Port Router
82
ParkerVision
11.2.3 Stateful Inspection Firewalls
Stateful inspection rewalls restrict access by screening data packets against dened access rules.
They make access control decisions based on IP address and protocol. They also “inspect” the session
data to assure the integrity of the connection and to adapt to dynamic protocols. These rewalls
generally provide the best speed and transparency; however, they may lack the granular application
level access control or caching that some proxies support. See section 11.5 for more information on
Stateful Inspection.
Firewalls, of one type or another, have become an integral part of standard security solutions for
enterprises.
11.3 Introduction to ParkerVision’s Firewall
The 1500WR Wireless Router rewall is a stateful inspection rewall and is designed to protect against
Denial of Service attacks when activated (in SMT menu 21.2 or in the web Web Conguration Utility).
The 1500WR Wireless Router’s purpose is to allow a private Local Area Network (LAN) to be securely
connected to the Internet. The 1500WR Wireless Router can be used to prevent theft, destruction and
modication of data, as well as log events, which may be important to the security of your network. The
1500WR Wireless Router also has packet-ltering capabilities.
11.4 Denial of Service
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet.
Their goal is not to steal information, but to disable a device or network so users no longer have access
to network resources. The 1500WR Wireless Router is pre-congured to automatically detect and
thwart all known DoS attacks.
Horizons 1500WR Wireless 4-Port Router
83
ParkerVision
11.4.1 Basics
Computers share information over the Internet using a common language called TCP/IP. TCP/IP, in
turn, is a set of application protocols that perform specic functions. An “extension number”, called the
“TCP port” or “UDP port” identies these protocols, such as HTTP (Web), FTP (File Transfer Protocol),
POP3 (E-mail), etc. For example, Web trafc by default uses TCP port 80.
When computers communicate on the Internet, they are using the client/server model, where the server
“listens” on a specic TCP/UDP port for information requests from remote client computers on the
network. For example, a Web server typically listens on port 80. Please note that while a computer may
be intended for use over a single port, such as Web on port 80, other ports are also active. If the person
conguring or managing the computer is not careful, a hacker could attack it over an unprotected port.
Some of the most common IP ports are:
11.4.2 Types of DoS Attacks
There are four types of DoS attacks:
1. Those that exploit bugs in a TCP/IP implementation.
2. Those that exploit weaknesses in the TCP/IP specication.
3. Brute-force attacks that ood a network with useless data.
4. IP Spoong.
1. “Ping of Death” and “Teardrop” attacks exploit bugs in the TCP/IP implementations of various
computer and host systems.
1-a Ping of Death uses a “ping” utility to create an IP packet that exceeds the maximum 65,536
bytes of data allowed by the IP specication. The oversize packet is then sent to an unsuspecting
system. Systems may crash, hang or reboot.
1-b Teardrop attack exploits weaknesses in the reassembly of IP packet fragments. As data
is transmitted through a network, IP packets are often broken up into smaller chunks. Each
fragment looks like the original IP packet except that it contains an offset eld that says, for
instance, “This fragment is carrying bytes 200 through 400 of the original (non fragmented) IP
packet.” The Teardrop program creates a series of IP fragments with overlapping offset elds.
When these fragments are reassembled at the destination, some systems will crash, hang, or
reboot.
2. Weaknesses in the TCP/IP specication leave it open to “SYN Flood” and “LAND” attacks. These
attacks are executed during the handshake that initiates a communication session between two
applications.
Horizons 1500WR Wireless 4-Port Router
84
ParkerVision
11.4.2 Types of DoS Attacks - Continued
Under normal circumstances, the application that initiates a
session sends a SYN (synchronize) packet to the receiving
server. The receiver sends back an ACK (acknowledgment)
packet and its own SYN, and then the initiator responds
with an ACK (acknowledgment). After this handshake, a
connection is established.
2. a) A SYN Attack oods a targeted system with a series
of SYN packets. Each packet causes the targeted system
to issue a SYN-ACK response. While the targeted system
waits for the ACK that follows the SYN-ACK, it queues up
all outstanding SYN-ACK responses on what is known as
a backlog queue. SYN-ACKs are moved off the queue only
when an ACK comes back or when an internal timer (which
is set at relatively long intervals) terminates the three-way
handshake. Once the queue is full, the system will ignore all
incoming SYN requests, making the system unavailable for
legitimate users.
2. b) In a LAND Attack, hackers ood SYN packets into the
network with a spoofed source IP address of the targeted
system. This makes it appear as if the host computer sent
the packets to itself, making the system unavailable while the
target system tries to respond to itself.
3. A brute-force attack, such as a “Smurf’ attack, targets
a feature in the IP specication known as directed or subnet
broadcasting, to quickly ood the target network with useless
data. A Smurf hacker oods a router with Internet Control
Message Protocol (ICMP) echo request packets (pings).
Since the destination IP address of each packet is the
broadcast address of the network, the router will broadcast
the ICMP echo request packet to all hosts on the network.
If there are numerous hosts, this will create a large amount
of ICMP echo request and response trafc. If a hacker chooses to spoof the source IP address of the
ICMP echo request packet, the resulting ICMP trafc will not only clog up the “intermediary” network,
but will also congest the network of the spoofed source IP address, known as the “victim” network.
This ood of broadcast trafc consumes all available bandwidth, making communications impossible.
Horizons 1500WR Wireless 4-Port Router
85
ParkerVision
11.4.2 Types of DoS Attacks - Continued
ICMP Vulnerability
ICMP is an error-reporting protocol that works in concert with IP. The following ICMP types trigger an
alert:
Illegal Commands (NetBIOS and SMTP)
The only legal NetBIOS commands are the following - all others are illegal.
All SMTP commands are illegal except for those displayed in the following table.
Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes
when a packet lter rewall is congured incorrectly an attacker can traceroute the rewall gaining
knowledge of the network topology inside the rewall.
4. Often, many DoS attacks also employ a technique known as “IP Spoong” as part of their attack.
IP Spoong may be used to break into systems, to hide the hacker’s identity, or to magnify the effect
of the DoS attack. IP Spoong is a technique used to gain unauthorized access to computers by
tricking a router or rewall into thinking that the communications are coming from within the trusted
network. To engage in IP spoong, a hacker must modify the packet headers so that it appears that the
packets originate from a trusted host and should be allowed through the router or rewall. The 1500WR
Wireless Router blocks all IP Spoong attempts.
Horizons 1500WR Wireless 4-Port Router
86
ParkerVision
11.5 Stateful Inspection
Stateful inspection means the 1500WR Wireless Router records packet information, such as port
number and source/destination addresses and then allows or denies the response depending on your
rewall rules.
The default rules allow LAN-to-WAN trafc and deny trafc initiated from WAN-to-LAN.
The previous gure shows the 1500WR Wireless Router’s default rewall rules in action as well as
demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN
and responses to this request are allowed. However other Telnet trafc initiated from the WAN is
blocked.
Horizons 1500WR Wireless 4-Port Router
87
ParkerVision
Chapter 12
Firewall Screens
This chapter shows you how to congure your 1500WR Wireless Router rewall.
12.1 Access Methods
The web Web Conguration Utility is, by far, the most comprehensive rewall conguration tool your
1500WR Wireless Router has to offer. For this reason, it is recommended that you congure your
rewall using the web Web Conguration Utility. SMT screens allow you to activate the rewall.
12.2 Firewall Policies Overview
Firewall rules are grouped based on the direction of travel of packets to which they apply:
LAN to LAN/1500WR Wireless Router
• WAN to LAN
LAN to WAN
• WAN to WAN/1500WR Wireless Router
By default, the 1500WR Wireless Router’s stateful packet inspection allows packets traveling in the
following directions:
LAN to LAN/1500WR Wireless Router
This allows computers on the LAN to manage the 1500WR Wireless Router and communicate
between networks or subnets connected to the LAN interface.
LAN to WAN
By default, the 1500WR Wireless Router’s stateful packet inspection blocks packets traveling in the
following directions:
WAN to LAN
WAN to WAN/1500WR Wireless Router
This prevents computers on the WAN from using the 1500WR Wireless Router as a gateway to
communicate with other computers on the WAN and/or managing the 1500WR Wireless Router.
You may dene additional rules and sets or modify existing ones but please exercise extreme caution
in doing so.
Horizons 1500WR Wireless 4-Port Router
88
ParkerVision
12.2 Firewall Policies Overview - Continued
If you congure rewall rules without a good understanding of how they work, you might
inadvertently introduce security risks to the rewall and to the protected network. Make sure
you test your rules after you congure them.
For example, you may create rules to:
Block certain types of trafc, such as IRC (Internet Relay Chat), from the LAN to the Internet.
Allow certain types of trafc, such as Lotus Notes database synchronization, from specic hosts
on the Internet to specic hosts on the LAN.
Allow everyone except your competitors to access a Web server.
Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by comparing the Source IP address, Destination IP address and IP protocol
type of network trafc to rules set by the administrator. Your customized rules take precedence and
override the 1500WR Wireless Router’s default rules.
12.3 Rule Logic Overview
Study these points carefully before conguring rules.
12.3.1 Rule Checklist
1. State the intent of the rule. For example, “This restricts all IRC access from the LAN to the
Internet.” Or, “This allows a remote Lotus Notes server to synchronize over the Internet to an
inside Notes server.”
2. Is the intent of the rule to forward or block trafc?
3. What direction of trafc does the rule apply to (refer to 12.2)1
4. What IP services will be affected?
5. What computers on the Internet will be affected? The more specic, the better. For example, if
trafc is being allowed from the Internet to the LAN, it is better to allow only certain machines
on the Internet to access the LAN.
12.3.2 Security Ramications
Once the logic of the rule has been dened, it is critical to consider the security ramications created by
the rule:
1. Does this rule stop LAN users from accessing critical resources on the Internet? For example, if
IRC is blocked, are there users that require this service?
2. Is it possible to modify the rule to be more specic? For example, if IRC is blocked for all users,
will a rule that blocks just certain users be more effective?
3. Does a rule that allows Internet users access to resources on the LAN create a security
vulnerability? For example, if FTP ports (TCP 20,21) are allowed from the Internet to the LAN,
Internet users may be able to connect to computers with running FTP servers.
4. Does this rule conict with any existing rules?
Once these questions have been answered, adding rules is simply a matter of plugging the information
into the correct elds in the web Web Conguration Utility screensSource Address
Horizons 1500WR Wireless 4-Port Router
89
ParkerVision
12.3.3 Key Fields For Conguring Rules Action
Should the action be to Block or Forward?
“Block” means the rewall silently discards the packet.
Service
Select the service from the Service scrolling list box. If the service is not listed, it is necessary to rst
dene it. See section 12.5.3 for more information on predened services.
Source Address
What is the connection’s source address; is it on the LAN or WAN? Is it a single IP, a range of Ips or a
subnet?
Destination Address
What is the connection’s destination address; is it on the LAN or WAN? Is it a single IP, a range of Ips
or a subnet?
12.4 Connection Direction Examples
This section describes examples for rewall rules for connections going from LAN to WAN and from
WAN to LAN.
LAN to LAN/1500WR Wireless Router and WAN to WAN/1500WR Wireless Router rules apply to
packets coming in on the associated interface (LAN or WAN respectively). LAN to LAN/1500WR
Wireless Router means policies for LAN-to-1500WR Wireless Router (the policies for managing the
1500WR Wireless Router through the LAN interface) and policies for LAN-to-LAN (the policies that
control routing between two subnets on the LAN).
12.4.1 LAN to WAN Rules
The default rule for LAN to WAN trafc is that all users on the LAN are allowed non-restricted access to
the WAN. When you congure a LAN to WAN rule, you in essence want to limit some or all users from
accessing certain services on the WAN. See the following gure.
Horizons 1500WR Wireless 4-Port Router
90
ParkerVision
12.4.2 WAN to LAN Rules
The default rule for WAN to LAN trafc blocks all incoming connections (WAN to LAN). If you wish to
allow certain WAN users to have access to your LAN, you will need to create custom rules to allow it.
See the following gure.
12.5 Enabling Firewall
The ordering of your rules is very important as rules are applied in turn.
The default rules allow LAN-to-WAN trafc and deny trafc initiated from WAN-to-LAN. You may
block trafc initiated from the LAN by conguring blocked services in the Services screen. You may
allow trafc initiated from the WAN by conguring port-forwarding rules, one-to-one/many one-to-one
mapping rules and/or allow remote management.
The rewall is automatically enabled when you congure blocked services. When you congure a
remote management menu to allow access to the 1500WR Wireless Router, a rewall rule (WAN-to-
WAN) is automatically created.
Click ADVANCED and FIREWALL to open the Settings screen. Enable (or activate) the rewall by
selecting the Enable Firewall check box as seen in the screen on the following page.
Horizons 1500WR Wireless 4-Port Router
91
ParkerVision
12.5 Enabling Firewall - Continued
The following table describes the labels in this screen.
Firewall Settings
LABEL DESCRIPTION
Enable Firewall Select this check box to activate the rewall. The 1500WR Wireless Router performs access control and
protects against Denial of Service (DoS) attacks when the rewall is activated.
LAN to WAN To log packets related to rewall rules, make sure that Access Control under Log is selected in the
Logs, Log Settings screen.
Packets to Log Choose what LAN to WAN packets to log. Choose from:
No Log
Log Blocked (blocked LAN to WAN services appear in the Blocked Services textbox in the
Services screen (with Enable Services Blocking selected))
Log All (log all LAN to WAN packets)
WAN to LAN To log packets related to rewall rules, make sure that Access Control under Log is selected in the
Logs, Log Settings screen.
Packets to Log Choose what WAN to LAN and WAN to WAN/Prestige packets to log. Choose from: • No Log
Log Forwarded Log All (log all WAN to LAN packets).
Allow one specic computer full access to all blocked resources.
Trusted
Computer IP
Address
You can allow a specic computer to access all Internet resources without restriction. Enter
the IP address of the trusted computer in this eld.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
92
ParkerVision
12.5.1 Conguring Content Filtering
Content ltering allows you to block web sites by URL keywords that you specify, for example, you can
block access to all web sites with the word “bad” in the URL by specifying “bad’ as a keyword.
You can also block access to web proxies and pages containing Active X components, Java applets
and cookies. Finally you can schedule when the 1500WR Wireless Router performs content ltering by
day and time.
Click ADVANCED, FIREWALL and then the Filter tab to open the Filter screen.
The settings in the screen above are described on the next page.
Horizons 1500WR Wireless 4-Port Router
93
ParkerVision
12.5.1 Conguring Content Filtering - Continued
The following table describes the labels in the screen on the preceeding page.
Firewall Filter
LABEL DESCRIPTION
Restrict Web
Features
Select the categories of web features that you want to restrict.
ActiveX ActiveX is a tool for building dynamic and active Web pages and distributed object
applications. When you visit an ActiveX Web site, ActiveX controls are downloaded to
your browser, where they remain in case you visit the site again.
Java Java is a programming language and development environment for building
downloadable Web components or Internet and intranet business applications of all
kinds.
Cookies Web servers that track usage and provide service based on ID use cookies.
Web Proxy This is a server that acts as an intermediary between a user and the Internet to
provide security, administrative control, and caching service. When a proxy server
is located on the WAN it is possible for LAN users to circumvent content ltering by
pointing to this proxy server.
Enable URL Keyword
Blocking
Select this check box to block the URL containing the keywords in the keyword list
Keyword Type a keyword in this eld. You may use any character (up to 64 characters).
Wildcards are not allowed.
Keyword List This is a list of keywords that will be inaccessible to computers on your LAN once
you enable URL keyword blocking.
Add Type a keyword in the Keyword eld and click then Add to add a keyword to the
Keyword List.
Delete Select a keyword from the Keyword List and then click Delete to remove this
keyword from the list.
Clear All Click Clear All to empty the Keyword List.
Day to Block Select everyday or the day(s) of the week to activate blocking.
Time of Day to Block
(24-Hour Format)
Select All Day or enter the start and end times in the hour-minute format to activate
blocking.
Apply Click Apply to save your customized settings.
Reset Click Reset to reload the previous conguration for this screen.
12.5.2 Conguring Firewall Services
Click ADVANCED, FIREWALL and then the Services tab to open the Services screen. Use this
screen to enable service blocking, enter/delete/modify the services you want to block and the date/time
you want to block them.
Horizons 1500WR Wireless 4-Port Router
94
ParkerVision
12.5.2 Conguring Firewall Services - Continued
The following table describes the labels in this screen.
Creating/Editing A Firewall Rule
LABEL DESCRIPTION
Enable Services
Blocking
Select the check box to activate service blocking.
Available Services This is a list of pre-dened services (ports) you may prohibit your LAN computers
from using. Select the port you want to block using the drop-down list and click Add to
add the port to the Blocked Service eld.
Please see Table 12-4 for more information on services available
Blocked Services This is a list of services (ports) that will be inaccessible to computers on your LAN
once you enable service blocking. Choose the IP port (TCP, UDP orTCP/UDP) that
denes your customized port from the drop down list box.
Custom Port A custom port is a service that is not available in the pre-dened Available
Services list and you must dene using the next two elds.
For a comprehensive list of port numbers and services, visit the IANA (Internet
Assigned Number Authority) web site.
Table continued on next page.
Horizons 1500WR Wireless 4-Port Router
95
ParkerVision
12.5.2 Conguring Firewall Services - Continued
Creating/Editing A Firewall Rule - Continued
LABEL DESCRIPTION
Type Services are either TCP and/or UDP. Select from either TCP or UDP.
Port Number Enter the port number range that denes the service. For example, suppose you want to dene
the Gnutella service. Select TCP type and enter a port range from 6345-6349.
Add Select a service from the Available Services drop-down list and then click Add to add a service
to the Blocked Service.
Delete Select a service from the Blocked Services List and then click Delete to remove this service
from the list.
Clear All Click Clear All to empty the Blocked Service.
Day to Block Select everyday or the day(s) of the week to activate blocking.
Time of Day to
Block (24-Hour
Format)
Select the time of day you want service blocking to take effect. Congure blocking to take effect
all day by selecting the All Day check box. You can also congure specic times that by entering
the start time in the Start (hr) and Start (min) elds and the end time in the End (hr) and End
(min) elds. Enter times in 24-hour format, for example, “3:00pm” should be entered as “15:00”.
Apply Click Apply to save your customized settings.
Reset Click Reset to reload the previous conguration for this screen.
12.5.3 Predened Services
The Available Services list box in the Services screen (SEE PAGE XXX) displays all predened services
that the 1500WR Wireless Router already supports. Next to the name of the service, two elds appear
in brackets.
The rst eld indicates the IP protocol type (TCP, UDP, or ICMP). The second eld indicates the IP port
number that denes the service. (Note that there may be more than one IP protocol type.
For example, look at the default conguration labeled “(DNS)”. (UDP/TCP:53) means UDP port 53 and
TCP port 53. Up to 128 entries are supported.
Custom services may also be congured using the Custom Ports function discussed later.
See the next page for a list of predened services.
Horizons 1500WR Wireless 4-Port Router
96
ParkerVision
12.5.3 Predened Services - Continued
Predened Services
SERVICE DESCRIPTION
BGP(TCP:179) Border Gateway Protocol.
BOOTP_CLIENT(UDP:68) DHCP Client.
BOOTP_SERVER(UDP:67) DHCP Server.
CU-SEEME (TCP/UDP:
7648, 24032)
A popular videoconferencing solution from White Pines Software.
DNS(UDP/TCP:53) Domain Name Server, a service that matches web names (e.g.
www.ParkerVision.com) to IP numbers.
FINGER(TCP:79) Finger is a UNIX or Internet related command that can be used to nd out if a
user is logged on.
FTP(TCP:20.21) File Transfer Program, a program to enable fast transfer of les, including
large les that may not be possible by e-mail.
HTTP(TCP:80) Hyper Text Transfer Protocol - a client/server protocol for the world wide
web.
ICQ(UDP:4000) This is a popular Internet chat program.
IPSEC_TUNNEL(ESP:O) The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses
this service.
IRC(TCP/UDP:6667) This is another popular Internet chat program.
MULTICAST(IGMP:O) Internet Group Multicast Protocol is used when sending packets to a specic
group of hosts.
NEWS(TCP:144) A protocol for news groups.
NFS(UDP:2049) Network File System - NFS is a client/server distributed le service that
provides transparent le sharing for network environments.
NNTP(TCP:119) Network News Transport Protocol is the delivery mechanism for the
USENET newsgroup service.
PING(ICMP:O) Packet INternet Groper is a protocol that sends out ICMP echo requests to
test whether or not a remote host is reachable.
PPTP(TCP:1723) Point-to-Point Tunneling Protocol enables secure transfer of data over public
networks. This is the control channel.
PPTP_TUNNEL(GRE:O) Point-to-Point Tunneling Protocol enables secure transfer of data over public
networks. This is the data channel.
RCMD(TCP:512) Remote Command Service.
REAL_AUDIO(TCP:7070) A streaming audio service that enables real time sound over the web.
REXEC(TCP:514) Remote Execution Daemon.
RLOGIN(TCP:513) Remote Login.
RTELNET(TCP:107) Remote Telnet.
RTSP(TCP/UDP:554) The Real Time Streaming (media control) Protocol (RTSP) is a remote
control for multimedia on the Internet.
SFTP(TCP:115) Simple File Transfer Protocol.
SMTP(TCP:25) Simple Mail Transfer Protocol is the message-exchange standard for the
Internet. SMTP enables you to move messages from one e-mail server to
another.
Horizons 1500WR Wireless 4-Port Router
97
ParkerVision
12.5.3 Predened Services - Continued
Predened Services
SERVICE DESCRIPTION
SNMP(TCP/UDP:161) Simple Network Management Program.
SNMP-TRAPS(TCP/
UDP:162)
Traps for use with the SNMP (RFC:1215).
SQL-NET(TCP:1521) Structured Query Language is an interface to access data on many different
types of database systems, including mainframes, midrange systems, UNIX
systems and network servers.
SSH(TCP/UDP:22) Secure Shell Remote Login Program.
STRM WORKS(UDP:1558) Stream Works Protocol.
TELNET(TCP:23) Telnet is the login and terminal emulation protocol common on the Internet
and in UNIX environments. It operates over TCP/IP networks. Its primary
function is to allow users to log into remote host systems.
TFTP(UDP:69) Trivial File Transfer Protocol is an Internet le transfer protocol similar
to FTP, but uses the UDP (User Datagram Protocol) rather than TCP
(Transmission Control Protocol).
VDOLIVE(TCP:7000) Another videoconferencing solution.
Horizons 1500WR Wireless 4-Port Router
98
ParkerVision
Chapter 13
Remote Management
This chapter provides information on the Remote Management screens.
13.1 Remote Management Overview
Remote management allows you to determine which services/protocols can access which 1500WR
Wireless Router interface (if any) from which computers. You can customize the service port, access
interface and the secured client IP address to enhance security and exibility.
When you congure remote management to allow management from the WAN, you
still need to congure a rewall rule to allow access. See the rewall chapters for
details on conguring rewall rules.
You may manage your 1500WR Wireless Router from a remote location via:
Internet (WAN only) ALL (LAN and WAN)
LAN only, • Neither (Disable).
When you Choose WAN only or ALL (LAN & WAN), you still need to
congure a rewall rule to allow access.
To disable remote management of a service, select Disable in the corresponding Server Access eld.
13.1.1 Remote Management Limitations
Remote management over LAN or WAN will not work when:
1. A lter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web
service.
2. You have disabled that service in one of the remote management screens.
3. The IP address in the Secured Client IP eld does not match the client IP address. If it does not
match, the 1500WR Wireless Router will disconnect the session immediately.
4. There is an SMT console session running.
5. There is already another remote management session of the same type (web, FTP or Telnet)
running. You may only have one remote management session of the same type running at one time.
6. There is a web remote management session running with a Telnet session. A Telnet session will be
disconnected if you begin a web session; it will not begin if there already is a web session.
Horizons 1500WR Wireless 4-Port Router
99
ParkerVision
13.1.2 Remote Management and NAT
When NAT is enabled:
• Use the 1500WR Wireless Router’s WAN IP address when conguring from the WAN. y Use the
1500WR Wireless Router’s LAN IP address when conguring from the LAN.
13.1.3 System Timeout
There is a system timeout of ve minutes (three hundred seconds) for either the console port or telnet/
web/FTP connections. Your 1500WR Wireless Router automatically logs you out if you do nothing in
this timeout period, except when it is continuously updating the status in menu 24.1 or when sys stdio
has been changed on the command line.
13.2 Telnet
You can telnet into the 1500WR Wireless Router to perform remote management.
13.3 Conguring TELNET
Click ADVANCED and then REMOTE MANAGEMENT to open the TELNET screen, shown on the next
page.
Horizons 1500WR Wireless 4-Port Router
100
ParkerVision
13.3 Conguring TELNET - Continued
The following table describes the labels in this screen.
Telnet
LABEL DESCRIPTION
Server Port You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access Select the interface(s) through which a computer may access the 1500WR Wireless
Router using this service.
Secured Client
IP Address
A secured client is a “trusted” computer that is allowed to communicate with the 1500WR
Wireless Router using this service.
Select All to allow any computer to access the 1500WR Wireless Router using this
service.
Choose Selected to just allow the computer with the IP address that you specify to
access the 1500WR Wireless Router using this service.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
101
ParkerVision
13.4 Conguring FTP
You can upload and download the 1500WR Wireless Router’s rmware and conguration les using
FTP, please see the chapter on rmware and conguration le maintenance for details. To use this fea-
ture, your computer must have an FTP client.
To change your 1500WR Wireless Router’s FTP settings, click ADVANCED, REMOTE MANAGEMENT
and then the FTP tab. The screen appears as shown.
The following table describes the labels in this screen.
FTP
LABEL DESCRIPTION
Server Port You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access Select the interface(s) through which a computer may access the 1500WR Wireless
Router using this service.
Secured Client
IP Address
A secured client is a “trusted” computer that is allowed to communicate with the 1500WR
Wireless Router using this service.
Select All to allow any computer to access the 1500WR Wireless Router using this
service.
Choose Selected to just allow the computer with the IP address that you specify to
access the 1500WR Wireless Router using this service.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
102
ParkerVision
13.5 Conguring WWW
To change your 1500WR Wireless Router’s World Wide Web settings, click ADVANCED, REMOTE
MANAGEMENT and then the WWW tab. The screen appears as shown.
The following table describes the labels in this screen.
WWW
LABEL DESCRIPTION
Server Port You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access Select the interface(s) through which a computer may access the 1500WR Wireless
Router using this service.
Secured Client
IP Address
A secured client is a “trusted” computer that is allowed to communicate with the 1500WR
Wireless Router using this service.
Select All to allow any computer to access the 1500WR Wireless Router using this
service.
Choose Selected to just allow the computer with the IP address that you specify to
access the 1500WR Wireless Router using this service.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.
Horizons 1500WR Wireless 4-Port Router
103
ParkerVision
13.6 Conguring SNMP
Simple Network Management Protocol is a protocol used for exchanging management information
between network devices. SNMP is a member of the TCP/IP protocol suite. Your 1500WR Wireless
Router supports SNMP agent functionality, which allows a manager station to manage and monitor the
1500WR Wireless Router through the network. The 1500WR Wireless Router supports SNMP version
one (SNMPvl) and version two c (SNMPv2c).
The next gure illustrates an SNMP management operation. SNMP is only available if TCP/IP is
congured.
An SNMP managed network consists of
two main types of component: agents and a
manager.
An agent is a management software
module that resides in a managed device
(the 1500WR Wireless Router). An agent
translates the local management information
from the managed device into a form
compatible with SNMP. The manager
is the console through which network
administrators perform network management
functions. It executes applications that
control and monitor managed devices.
The managed devices contain object
variables/managed objects that dene each
piece of information to be collected about
a device. Examples of variables include
the number of packets received, node port
status etc. A Management Information Base
(MIB) is a collection of managed objects.
SNMP allows a manager and agents to
communicate for the purpose of accessing
these objects.
SNMP itself is a simple request/response protocol based on the manager/agent model. The manager
issues a request and the agent returns responses using the following protocol operations:
• Get - Allows the manager to retrieve an object variable from the agent.
• GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent.
In SNMPvl, when a manager wants to retrieve all elements of a table from an agent, it initiates a
Get operation, followed by a series of GetNext operations.
• Set - Allows the manager to set values for object variables within an agent.
• Trap - Used by the agent to inform the manager of some events.
Horizons 1500WR Wireless 4-Port Router
104
ParkerVision
13.6.1 Supported MIBs
The 1500WR Wireless Router supports MIB II that is dened in RFC-1213 and RFC-1215. The focus of
the MIBs is to let administrators collect statistical data and monitor status and performance.
13.6.2 SNMP Traps
The 1500WR Wireless Router will send traps to the SNMP manager when any one of the following
events occurs:
SNMP Traps
TRAP* TRAP NAME DESCRIPTION
1coldStart (dened in RFC-1215) A trap is sent after booting (power on).
2warmStart (dened in RFC-1215) A trap is sent after booting (software reboot).
3NnkUp (dened in RFC-1215) A trap is sent when the port is up.
4authenticationFailure (dened in
RFC-1215)
A trap is sent to the manager when receiving any
SNMP get or set requirements with wrong community
(password).
6NnkDown (dened in RFC-1215) A trap is sent when the port is down.
The following table maps the physical port and encapsulation to the interface type.
Ports and Interface Types
PHYSICAL PORT/ENCAP INTERFACE TYPE
LAN port(s) enetO
Wireless port eneti
PPPoE encap pppoe
1483 encap mpoa
Ethernet encap enet-encap
PPPoA PPP
Horizons 1500WR Wireless 4-Port Router
105
ParkerVision
13.6.3 REMOTE MANAGEMENT: SNMP
To change your 1500WR Wireless Router’s SNMP settings, click ADVANCED, REMOTE
MANAGEMENT and then the SNMP tab. The screen appears as shown.
The following table describes the labels in this screen.
SNMP
LABEL DESCRIPTION
SNMP Conguration
Get Community Enter the Get Community, which is the password for the requests from the management
station. incoming Get and GetNext
Set Community Enter the Set community, which is the password for incoming Set requests from the
management station.
Trusted Host If you enter a trusted host, your 1500WR Wireless Router will only respond to SNMP
messages from this address. A blank (default) eld means your 1500WR Wireless
Router will respond to all SNMP messages it receives, regardless of source.
Trap
Community Type the trap community, which is the password sent with each trap to the SNMP
manager.
Destination Type the IP address of the station to send your SNMP traps to.
SNMP
Server Port You may change the server port number for a service if needed, however you must
use the same port number in order to use that service for remote management.
Server Access Select the interface(s) through which a computer may access the 1500WR Wireless
Router using this service.
Horizons 1500WR Wireless 4-Port Router
106
ParkerVision
13.7 Conguring DNS
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice
versa, for example, the IP address ofwww.ParkerVision.com is 204.217.0.2. Refer to the Internet
Access chapter for more information.
To change your 1500WR Wireless Router’s DNS settings, click ADVANCED, REMOTE
MANAGEMENT and then the DNS tab. The screen appears as shown.
The following table describes the labels in this screen.
DNS
LABEL DESCRIPTION
Server Port The DNS service port number is 53 and cannot be changed here.
Server Access Select the interface(s) through which a computer may send DNS queries to the 1500WR
Wireless Router.
Secured Client
IP Address
A secured client is a “trusted” computer that is allowed to send DNS queries to the
1500WR Wireless Router.
Select All to allow any computer to send DNS queries to the 1500WR Wireless Router.
Choose Selected to just allow the computer with the IP address that you specify to
send DNS queries to the 1500WR Wireless Router.
Apply Click Apply to save your changes back to the 1500WR Wireless Router.
Reset Click Reset to begin conguring this screen afresh.

Navigation menu